Remove Email Compromise Remove Law Enforcement Remove Phishing
article thumbnail

SEC Warns Cos To Prioritize Cybersecurity

PYMNTS

The SEC’s investigations focused on “business email compromises” (BECs), where criminals posed as company executives or vendors and used emails to trick employees into sending large sums to fraudulent bank accounts.

article thumbnail

Scammers Love Bitcoin, But Consumers Aren’t So Enthusiastic

PYMNTS

The Financial Crimes Enforcement Network recently issued a warning that fraudsters are leveraging various illicit methods, including malware, phishing schemes, extortion and business email compromise (BEC) scams — all with a COVID-19 twist.

Bitcoin 93
article thumbnail

Fraudsters Try New Spins On The BEC Scam

PYMNTS

The Business Email Compromise (BEC) continues to evolve. According to law enforcement in the country, the BEC is increasingly targeting businesses with fraudulent requests for funds loaded onto iTunes or Google Play cards, claiming to be for work-related expenses or client gifts. million, thanks to a phishing scam.

article thumbnail

Business Scams, Everywhere, Phishing For Funds

PYMNTS

This past week saw the Federal Trade Commission (FTC) announce a new law enforcement initiative that focuses on bad actors who seek to commit crimes against small businesses. Want more proof of email as a favorite scamming tool? Finance departments were most vulnerable.

Scams 45
article thumbnail

A Hacker Group Has A List Of 35,000 CFOs To Target

PYMNTS

The Financial Times , citing cyber threat detection company Agari, reported the group, which goes by the name London Blue, is focusing on the business email compromise scam. Agari, noted the report, turned over the evidence to law enforcement agencies both in the U.S. Agari found the list, which has 50,000 targets.

article thumbnail

Putting FIs Through Cybersecurity Drills To Prepare For The Next Big One

PYMNTS

In an account takeover, a fraudster can take over a corporation’s financial account using phishing, spyware or malware. “At During the simulation, participants reacted to different types of hacks, including leaked CEO emails, compromised financial and health records and infrastructure attacks that left some employees stuck in elevators.

FS-ISAC 47