Don’t Fall for a Social Engineering Scam

By: Christian Spencer, CPA, Partner

Even the most sophisticated organization can be the target of an online attack scheme known as spear phishing. Spear phishing is an email that appears to be from top level management in your organization, typically the Chief Executive Officer (CEO); however, it is from a fraudster. Under an attack process called Social Engineering, the fraudster relies heavily on human interaction and often attempts to trick people into breaking normal security procedures around disbursements. These schemes are becoming more widespread and can affect any organization, even those with the highest level of information technology security.

In these types of attacks, a fraudster will provide enough information in his email so that it appears to come from the CEO. As a result, the organization will bypass an element of its internal control structure in order to meet the CEO’s request to wire a key vendor a sum of money as quickly as possible. While there’s no guaranteed way to prevent spear phishing emails from being received, recognizing the methodologies used in these types of attacks is key to increasing staff awareness around evolving fraud schemes and hopefully preventing your organization from becoming a victim.

To gain the employee’s trust and appear legitimate, the content of a spear phishing email may include any of the following characteristics:

  • It appears to come from the CEO, sometimes occurring when the CEO is out of the office or away traveling. The fraudster has spoofed the organization’s web domain name to make the message appear to originate from the organization’s computer network. This is accomplished by subtly altering characters in the e-mail address to resemble a legitimate email address. Also, computer software and applications exist which allow one to mask the originating web domain address resulting in the appearance of an e-mail being sent by someone else.
  • It discusses details about an upcoming meeting or conference including the location of the meeting, key speakers, and topics to be discussed. All of this is readily available on the organization’s website and serves to legitimize the request.
  • It contains specific information about the organization that the fraudster has obtained from the internet, social media, or the IRS Form 990.
  • It is addressed to a specific individual in the accounting department by name and title. The fraudster has researched the staff hierarchy and reaches out to the individual he thinks can best facilitate initiating and approving the wire transfer process.

The organization typically discovers the fraud once it is verbally confirmed with the CEO, however, in many instance this is too late and the funds have been lost.   Despite the increase in the numbers and sophistication of this type of fraud, the following simple steps, if consistently followed, can be effective in detecting and preventing this type of fraud from occurring:

  • Never pay a vendor that is not on your approved vendor list.
  • Never disburse funds without an approved invoice.
  • Never disburse funds solely through the request of anyone simply through an email, even the CEO.
  • Confirm wire transfer requests verbally with the employee who appears to be sending the request. Do not rely strictly on email requests for wire transfers.
  • Confirm wire transfer requests with the vendor using previously known contact information and not the information contained in the email.

In addition, we recommend that you inquire with your insurance carrier regarding your policy’s coverage should you become a victim. Some standard insurance policies will not cover losses resulting from this kind of fraud unless the policy is specifically defined to include “social engineering coverage.”

With the vast amount of information available on the internet, social engineering fraud is a serious and ongoing threat for organizations of all sizes and industries. Remaining cognizant of these types of attacks, educating your employees about how they occur, and having a plan in place to prevent a financial loss are all essential elements that need to be addressed in your overall risk assessment and monitoring of internal controls.

INSIGHTS & RESOURCES

Modernizing the Budgeting, Planning and Forecasting Process

Posted on , updated on

Exempt Organization Tax08/06/2019

Insights08/06/2019

Nonprofit Accounting-Tax-Technology08/06/2019

Podcasts08/06/2019

In this episode of our Nonprofit Knowledge Center podcast series, we discuss how nonprofits are using technology to modernize the budgeting, planning and forecasting process.

Highlights from the 7th Annual Higher Education Taxation Institute

Posted on , updated on

Exempt Organization Tax07/22/2019

Insights07/22/2019

Nonprofit Accounting-Tax-Technology07/22/2019

Podcasts07/22/2019

In this podcast, T&T Tax Principal Mike Sorrells joins Laura Kalick, Esq. to discuss highlights and key takeaways from the 7th Annual Higher Education Taxation Institute.

Resources Center

The Right Size, Right Fit

X
X
X