It appears that the fraudsters are now taking the time to learn your business (presumably leveraging website, social media, etc.) and determining who the senior decision-makers are to greatly increase the chance of the email scams succeeding. Often this will involve impersonating a client or supplier (“We have changed our bank account, please make payment to…”) or impersonating someone from your organisation (“Please pay the attached invoice …”).
We are aware of at least three main variations:
- Email purportedly from the CEO (or similar) requesting payment – similar email account. These are emails that appear to be from the CEO that are sent to accounts payable/finance requesting that an urgent payment be made for services rendered (or similar). The email visually appears similar to a genuine email sent from the CEO, but the email address will be slightly different from the CEO’s genuine email address. For example:
“From:john.smith@bigcoy.co.nz
To: accountspayable@bigco.co.nz
Subject: invoice for consulting services
Hi Mark,
Could you please ensure that the attached invoice is paid asap. Code the cost to consulting.
Thanks,
John.”
In this case, the genuine email address is "john.smith@bigco.co.nz", so provided accounts payable do not spot the subtle difference in the email account, there is a reasonably high risk the fraudulent payment will be made.
- Email appears identical to the genuine sender’s email address, but has been ‘spoofed’ to appear that way. These are email addresses that have been ‘spoofed’ to appear the exact same as the sender’s genuine email address, but were actually sent from a different email account.
- Email purportedly from the CEO (or similar) requesting payment – genuine email account. In this version, the fraudsters send the email using the CEO’s (or similar) genuine email account. The fraudsters are able to do so after hacking the email account.