About Us | Contact Us
View Cart

The 12 Billion Dollar Scam

By Vigilize | Sunday, July 22, 2018 - Leave a Comment

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013…


An article review.


Be Suspicious When Anyone Requests that you Send Them Money!

So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our friend Wes Pollard from HomeBank reminded us of one of those threats recently when he submitted this announcement from the FBI’s Internet Crime Complaint Center about business email compromise (BEC).

While most people remain vigilant when receiving emails from unknown sources, with business email compromise the messages are coming from a trusted address and so the recipient may be more likely to open the message and follow its instructions. How likely are people to open these messages? Using cases reported directly to the FBI since 2013, there were over 41,000 reported cases totaling nearly three billion dollars in losses. If you expand the cases to those reported to other agencies since 2013, the number of victims totals nearly 80,000, with losses exceeding 12 billion dollars.

Fortunately, preventing these kinds of attacks is fairly simple: a person’s identity should be positively verified before releasing private information or changing account information. This is especially important as the FBI has noted some attackers using phone calls in coordination with a compromised email account in their schemes: a caller will use the fact that they just sent a message from the compromised account as proof they are the person they are impersonating.

Even if someone gains control of a “trusted” email address, if your employees are asking out-of-wallet questions to verify identities the bad guys won’t get very far.


Original article by the Internet Crime Complaint Center.


same_strip_012513


 

Latest News
    PRESS RELEASE – FOR IMMEDIATE RELEASE SERVICE NEWS Dateline: Dayton, IN, June 22, 2022 We are proud to announce that infotex will now be supporting Endpoint Detection and Response (XDR/MDR)! We can manage/monitor solutions you already have or offer one as part of our service while still maintaining a segregated response posture. In recent years […]
    Over 85 percent of surveyed companies report having no  centralized monitoring of networked industrial devices… An article review. If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant activity from your networked devices, especially if your organization is involved in healthcare, finance, or government.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    We always strive to bring you the best content that we possibly can. Your opinion on any content, presentation, service, or anything else you have received from us is important! Please click the button below to let us know how we are doing!  
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]
    Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]