Cyber Threats Views from the FBI. Special Agent Keith Custer Federal Bureau of Investigation Baltimore Division

Size: px
Start display at page:

Download "Cyber Threats Views from the FBI. Special Agent Keith Custer Federal Bureau of Investigation Baltimore Division"

Transcription

1 Cyber Threats Views from the FBI Special Agent Keith Custer Federal Bureau of Investigation Baltimore Division

2 Overview Cyber Threat Overview Cyber-enabled Fraud Types of Cyber-enabled Fraud Business Compromise (BEC) Case Studies Best Practices to Protect Against Cyber-enabled Fraud UNCLASSFIED 2

3 Cyber Threats Cyber Division (CyD) Intrusions Major Infrastructure Defense Nation State Attacks Criminal Investigative Division (CID) Cyber-enabled Crime Fraud Drugs Money Laundering Identity Theft UNCLASSFIED 3

4 UNCLASSIFIED The FBI s Cybersecurity Mission To protect the United States against: Terrorist attack Foreign intelligence operations and espionage Cyber-based attacks and high technology crimes As the only U.S. agency with the authority to investigate both criminal and national security cybersecurity threats, the FBI is following a number of emerging trends. UNCLASSFIED 4

5 Cyber Threats and Motivations 5

6 Cyber-Enabled Fraud The advent of the Internet has made a lot of things easier for a lot of people Unfortunately this includes fraudsters UNCLASSIFIED 6

7 Common Types of Cyber-enabled Fraud Targeting Businesses Counterfeit Check scam (multiple varieties) Attorney/CPA Employment-based Account Takeover Business Compromise (BEC) UNCLASSFIED 7

8 Counterfeit Check Scam (Attorney/CPA) Target is usually solicited by Often the fraudster spoofs the of a real executive (e.g., jbsmith@acmefireworks.com vs. jbsmith@acmeflreworks.com ) The fraudster requests assistance with an international business matter, such as an acquisition or contract dispute If the target agrees the fraudster arranges for a high-quality counterfeit instrument to be delivered to the target as part of the engagement The target is directed to deposit the check and immediately wire funds to a drop account, usually a shell corporation in a foreign country (China, Taiwan, Malaysia, Dubai, Japan, etc.) The funds are immediately withdrawn or transferred out of the destination account The check is eventually found to be fake and the target is sometimes on the hook for the loss. Transactions are typically $100,000 to $500,000 UNCLASSFIED 8

9 Account Takeover Frequently targets individuals or businesses after a compromise of personal information ( hack or PII stolen) Fraudster identifies high value accounts Home Equity Line of Credit (HELOC) Brokerage Money Market Savings Fraudster contacts financial institution call center or and attempts to initiate a wire transfer to a drop account Fraudster will attempt to socially engineer verification Fraudster will attempt to have the targets home phone forwarded to his burner cell phone If business has been done by in past, sometimes no verification is required Usually the financial institution will take the loss in account takeovers after reimbursing the victim for any unauthorized withdrawals UNCLASSIFIED 9

10 Business Compromise (BEC) Definition BEC is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising or spoofing legitimate business accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds. Most victims report using wire transfers as the common method of transferring funds for business purposes; however, some victims report using checks as the common method of payment. The fraudsters will use the method most commonly associated with their victim s normal business practices. This definition was revised to emphasize the different techniques used to compromise victim accounts. 10

11 Ubiquiti reported in August 2015 it was a BEC victim UNCLASSIFIED 11

12 BEC Descriptions Version 1: Fraudster impersonates CEO or CFO to initiate a wire transfer The fraudster hacks or spoofs a business executive s account. A request, seemingly on behalf of this business executive, is then forwarded to a second employee requesting a wire transfer to a fraudster controlled bank account. The second employee complies with the business executive s request and sends the payment. Sometimes the fraudster compromises a business executive s account and contacts the bank directly, asking for an urgent wire transfer. This process is repeated every few days until discovered. Typical transactions are $100,000 to $200,

13 BEC Case Study: Version 1 Victim A: A publicly traded, San Diego, CA-based educational resources firm with $638 million in revenues in 2014 On April 7, 2014, Victim A s corporate controller (Russell) was contacted by an individual purporting to be the CFO (Daniel) and directed to send an $85,050 wire, supposedly at the direction of the CEO (Andrew)

14 BEC Case Study: Version 1

15 BEC Case Study: Version 1 On April 8, 2014, Victim A s corporate controller (Russell) was again contacted by the same individual purporting to be the CFO (Daniel) and directed to send a $115,000 wire, again at the direction of the CEO (Andrew)

16 BEC Case Study: Version 1

17 BEC Case Study: Version 1 On April 9, 2014, the fraud was discovered, but the funds could not be recalled Contributing factors Russell was a relatively new employee (4 months) Wires had been done by in the past infrequently (lack of controls) Andrew and Dan were out of the office on April 7 th and 8 th No evidence of malware Source IP address had browsed company website on April 7, 2014

18 BEC Case Study: Version 1 Funds were transferred to an unwitting non-profit in San Diego, that was told they had been wired money accidentally and agreed to redirect the funds when contacted by the fraudsters $95,000 of the funds were redirected by bank wire to a shell company in the United States opened by an unemployed 28 year old Liberian female and withdrawn in cashier s check shortly after

19 BEC Descriptions Version 2: A business employee s is hacked An employee often in Accounts Receivable has their hacked, not spoofed. Requests for invoice payments are sent from this employee s to multiple vendors identified from this employee s contact list. These requests contain seemingly legitimate invoices with the payment instructions changed to fraudster controlled accounts. 19

20 BEC Case Study: Version #2 Victim B: A privately held, San Francisco, Californiabased international shipping and logistics firm On May 8, 2014, Victim B s corporate controller (Tim) was contacted by an individual purporting to be the CFO (James) and directed to send a $176, wire, supposedly at the direction of the CEO (George)

21 BEC Case Study: Version #2 Both wires were sent before the fraud was detected resulting in a loss of $343, Wire 1 was sent to: XXXXXXXXX Entertainment Inc. Taichung Commercial Bank Taipei, Taiwan Wire 2 was sent to: XXX LTD. Malayan Bank Kuala Lumpur, Malaysia

22 BEC Case Study: Version #2 Victim B continued to be targeted. In December 2014, a Victim B employee in Accounts Receivable (Catherine) was found to have opened an infected attachment that compromised her Victim B customers then began to receive correspondence from a spoofed using Catherine s name and an outlook.com address. The customers were asked to redirect payments to an account in Victim B s name (but not controlled by Victim B) at NATIONAL WESTMINSTER BANK in the United Kingdom These attempts were unsuccessful with the exception of a single payment of $36, on 2/11/2015

23 BEC Case Study: Version #2 Malware Bytes Detection 1/16/15 Malware was detected pidloc.txt (Malware.Trace.E) Detecting Trace^ The following symptoms signal that your computer is very likely to be infected with Trace: PC is working very slowly Trace can seriously slow down your computer. If your PC takes a lot longer than normal to restart or your Internet connection is extremely slow, your computer may well be infected with Trace. New desktop shortcuts have appeared or the home page has changed Trace can tamper with your Internet settings or redirect your default home page to unwanted web sites. Trace may even add new shortcuts to your PC desktop. Annoying popups keep appearing on your PC Trace may swamp your computer with pestering popup ads, even when you're not connected to the Internet, while secretly tracking your browsing habits and gathering your personal information. E mails that you didn't write are being sent from your mailbox Trace may gain complete control of your mailbox to generate and send e mail with virus attachments, e mail hoaxes, spam and other types of unsolicited e mail to other people.

24 BEC Case Study: Version #2

25 BEC Descriptions Version 3: Business Executive and Attorney Impersonation Fraudsters first contact an employee pretending to be a business executive, saying that an attorney will be calling or sending an about an urgent matter. The fraudsters contact the same employee pretending to be an attorney. The employee is requested to assist in handling confidential or timesensitive matters that involve the transfer of funds. The employee is pressured to act quickly or secretly in handling the transfer of funds. Requests may occur at the end of the business day or work week or are timed to coincide with the close of business of international financial 25 institutions.

26 BEC Example Attorney Impersonation UNCLASSIFIED 26

27 BEC Variants Version 4: A business working with a foreign supplier A business orders goods from a trusted supplier, usually in China or Hong Kong. The customer/victim is contacted by a fraudster via phone, fax, or e- mail to change the payment location of the invoice, usually to a bank in China or Hong Kong. The customer sends payment to the new bank account. 27

28 BEC Hallmarks Businesses and associated personnel using open source accounts are predominantly targeted. Individuals responsible for handling wire transfers within a specific business are targeted. Spoofed s very closely mimic a legitimate request. Fraudulent requests for a wire transfer are usually wellworded, specific to the business being victimized, and do not raise suspicions to the legitimacy of the request. Fraudsters use company logos, letterhead, invoice formats, and signatures of employees of the targeted supplier to increase believability. 28

29 BEC Hallmarks The amount of the fraudulent wire transfer request is business specific; therefore, dollar amounts requested are similar to normal business transaction amounts so as to not raise doubt. Additional spoofed addresses that appear to belong to the targeted business are sometimes copied to fraudulent s. Fraudulent s received have coincided with business travel dates for executives whose s were spoofed. Victims report that IP addresses frequently trace back to free domain registrars. The phrases code to admin expenses or urgent wire transfer were reported by victims in some of the fraudulent requests. 29

30 BEC Hallmarks Employees may be phished prior to the BEC incident Employees may be pressured to act quickly or secretly in making a transfer of funds BEC incidents may be timed for the close of either a domestic or international business day or week 30

31 BEC Impact 7,066 Victims $747,659, Dollar Loss US Outside the US 1,113 Victims $51,238, Dollar Loss 8,179 Victims $798,897, Dollar Loss BEC Global Total Amounts are only for those cases reported to the FBI from October 2013 to August

32 BEC Victims by Country *74 Countries with Victims October 2013 through June

33 Who Are the Victims of BEC Victims of the BEC scam range from small to large businesses. These businesses may purchase or supply a variety of goods, such as textiles, furniture, food, and pharmaceuticals. BOTH suppliers and their customers are victims of this scam. The scam impacts both ends of the supply chain, as both supplies and money can be lost and business relations may be damaged. Since the criminal activity is being facilitated through financial institutions, the financial institutions themselves can be considered victims. 33

34 Destinations of Fraudulent Transfers *72 Countries with Subjects October 2013 through June

35 Common Types of Cyber-enabled Fraud Targeting Individuals Romance Scams Every dating web site on the Internet is affected Advanced Fee Scheme International Lottery Overseas Inheritance IRS/DEA/FBI intimidation Sometimes with inside knowledge Account Takeovers Account Compromise Income Tax Refund Fraud UNCLASSIFIED 35

36 Romance Scams Vulnerable individuals, often elderly females, are targeted by fraudsters purporting to be U.S. businessmen or service members located overseas Victims are moved off website messaging as soon as possible Most victim contact continues via SMS text message, Yahoo! Chat, or After cultivating a strong romantic connection, the fraudster begins a never-ending string of scams Many victims believe they are engaged to the fraudster and carry on the relationship for years and continue even after confronted by family or the FBI UNCLASSIFIED 36

37 Typical Romance Scam Profiles Phillip Low Low purported to own a construction company working on a project in the Philippines Low provided collateral checks and requested loans to help complete the project The victim lost almost $70,000

38 Typical Romance Scam Profiles According to his profile, Lantz in interested in: Lantz Thompson open, honest, long lasting committed relationship, Someone i will grow old with. I believe a successful relationship requires both individuals to put 100% f ortrt (sic) into it. Both must also be able and willing to engage in meaningful conversation, and be able to express their deepest feelings. Surface talk I can do with anyone, and I want more. I enjoy family and friends, but the one who I enjoy the most is my mate! Nobody comes before her. I also believe we should always strive to be a good example before our children, even if they are grown. Trust and honesty is extremely important to me. If I can't trust my mate, who can I trust? I like people to be their selflf (sic), not pretend to be someone they are not

39 Typical Scams Oil Business in Nigeria Taxes/Fees Equipment lost or broken Bribe corrupt official Employee died or injured Rare Gem Dealer (SE Asia) Customs fees Bribe corrupt official Imprisoned overseas Fiancé Car accident, hospitalized Travel expenses to come home to marry victim Family member hospitalized Robbed overseas Construction Project in Philippines/Malaysia Taxes/Fees Equipment lost or broken Natural disaster Bribe corrupt official Employee died or injured

40 Common Types of Cyber-enabled Fraud Targeting Individuals Advanced Fee Schemes International Lottery Overseas Inheritance IRS/DEA/FBI intimidation Sometimes with inside knowledge Account Takeovers Account Compromise Income Tax Refund Fraud UNCLASSIFIED 40

41 Suggestions to Protect Yourself Create intrusion detection system rules that flag s with extensions that are similar to company . For example, legitimate of abc_company.com would flag fraudulent of abc-company.com. Register all company domains that are slightly different than the actual company domain. Verify changes in vendor payment location by adding additional two factor authentication such as having a secondary sign off by company personnel even if there is a delay in authorizing the payment. 41

42 Suggestions to Protect Yourself Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the request. Know the habits of your customers, including the details of, reasons behind, and amount of payments. Carefully scrutinize all requests for transfer of funds to determine if the requests are out of the ordinary. 42

43 Suggestions to Protect Yourself Avoid free web-based accounts: Establish a company domain name and use it to establish company e- mail accounts in lieu of free, web-based accounts. Be careful what is posted to social media and company websites, especially job duties/descriptions, hierarchal information, and out of office details. Be suspicious of requests for secrecy or pressure to take action quickly. 43

44 Suggestions to Protect Yourself Talk to your insurance carrier to see if you are covered in the event of a victimization Additional information is publically available on the United States Department of Justice website publication entitled Best Practices for Victim Response and Reporting of Cyber Incidents. 44

45 File a Complaint If you believe your businesses is the victim of cyberenabled fraud (regardless of dollar amount) report it to the Internet Crime Complaint Center (IC3) at 45

46 Cyber Threat Takeaways It s not just the hackers and data thieves you need to worry about Fraudsters will eventually find a company s vulnerabilities wherever they exist and exploit them Most of the time the vulnerability will be human in nature You are only as strong as your weakest link, educate your personnel, especially those in key positions UNCLASSIFIED 46

47 Questions? UNCLASSIFIED 47

Business Email Compromise Scam

Business Email Compromise Scam Business Email Compromise Scam The FBI has issued a warning about a significant spike in victims and dollar losses stemming from an increasingly common scam in which crooks spoof communications from executives

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks Nick Merker, CISSP, CIPT Stephen Reynolds, CISSP, CIPP/US Nick Reuhs Attorneys at Ice Miller LLP IceonFire Fund Transfer

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

Safeguard your business against fraud.

Safeguard your business against fraud. Safeguard your business against fraud. 1 Corporate fraud What is in this document? 1 Corporate fraud 3 What is in this document? How to use this document? 2 Social Engineering or CEO fraud 4 What is it?

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

How to Protect Yourself From Identity Theft and Internet Scams

How to Protect Yourself From Identity Theft and Internet Scams How to Protect Yourself From Identity Theft and Internet Scams Recent Statistics (2011) Internet Crime Complaint Center (IC3) received 314,246 complaints nationwide Complaints received in 2010 was 303,809

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

CREDIT CARD FRAUD PREVENTION IN NONPROFITS CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Spear phishing campaign targeting staff to perform wire transfers

Spear phishing campaign targeting staff to perform wire transfers Spear phishing campaign targeting staff to perform wire transfers Updated 3 February 2015. This is an update to the advisory originally released on 9 October 2014. The update includes additional recommendations

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Cybersecurity Governance Update on New FFIEC Requirements

Cybersecurity Governance Update on New FFIEC Requirements Cybersecurity Governance Update on New FFIEC Requirements cliftonlarsonallen.com Our perspective CliftonLarsonAllen Started in 1953 with a goal of total client service Today, Professional Services Firm

More information

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK Fraud Investigations Division: Global Security & Investigations Ed Cook Executive Director Regional Investigations Objectives: Provide a

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information

Fraud Trends. HSBCnet Online Security Controls PUBLIC

Fraud Trends. HSBCnet Online Security Controls PUBLIC Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015 12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

How To Protect Against Business Email Compromise Scams

How To Protect Against Business Email Compromise Scams Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How To Protect Against Business Email Compromise Scams

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

Criminal Investigation

Criminal Investigation Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Employment Internet Fraud FABRICS4YOU Textiles

Employment Internet Fraud FABRICS4YOU Textiles FRAUD TIP OF THE WEEK Employment Internet Fraud FABRICS4YOU Textiles A Latvian Textile Company Located in the United Kingdom By Detective Paul Henninger Salem Police Department March 2, 2007 During the

More information

DISCLAIMER AND NOTICES

DISCLAIMER AND NOTICES DISCLAIMER AND NOTICES The opinions expressed in this presentation are those of the author and presenter alone. They do not represent the views of any other entity. Nothing in this presentation should

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Your Personal Information: Protecting it from Exploitation

Your Personal Information: Protecting it from Exploitation Your Personal Information: Protecting it from Exploitation Data breaches involving personal information result in a broad range of risks to individuals and organizations. This includes identity theft,

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

Guide to Preventing Social Engineering Fraud

Guide to Preventing Social Engineering Fraud Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And

More information

Best Practices: Reducing the Risks of Corporate Account Takeovers

Best Practices: Reducing the Risks of Corporate Account Takeovers Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States

More information

Information Security Field Guide to Identifying Phishing and Scams

Information Security Field Guide to Identifying Phishing and Scams Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting

More information

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1 www.tn.gov/consumer

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1 www.tn.gov/consumer www.tn.gov/consumer Tennessee Division of Consumer Affairs Don t Get Scammed Table of Contents Auction Fraud...1 Counterfeit Cashier s Check...1 Credit Card Fraud...1 Debt Elimination...2 DHL/UPS...2 Employment/Business

More information

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Anti- Fraud Guide. Mariano Ciriotti Group Compliance Director Small World May 2013 Version 1.0. Contents:

Anti- Fraud Guide. Mariano Ciriotti Group Compliance Director Small World May 2013 Version 1.0. Contents: Anti- Fraud Guide Mariano Ciriotti Group Compliance Director Small World May 2013 Version 1.0 Contents: Introduction Fraudulent Abuse of Money Transfers Fraud Examples Tips for Customers Reporting Fraud

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

ecommercial SAT ecommercial Security Awareness Training Version 3.0

ecommercial SAT ecommercial Security Awareness Training Version 3.0 ecommercial SAT ecommercial Security Awareness Training Version 3.0 Welcome The goal of this training course is to provide you with the information needed to assist in keeping your online banking account

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection S.A.F.E. Senior Anti-Fraud Education Recognize a scam before you become a victim of fraud New York StaTe Department of State Division of Consumer Protection Advocating for and empowering New York consumers

More information

Welcome to this ACT webinar

Welcome to this ACT webinar Welcome to this ACT webinar Cybersecurity: threats and responses 02 June 2015 12.30-13.15 Sponsored BST by Sponsored by Introduction James Lockyer Development Director ACT Interactive widgets Please take

More information

SCHEMES SCAMS FRAUDS

SCHEMES SCAMS FRAUDS FRAUD ALERT! FRAUD ALERT! GUARDING AGAINST INTERNET & MOBILE FRAUD SCHEMES SCAMS FRAUDS & THESE SCAMS CAN COST YOU MONEY: Phishing spear phishing vishing smishing debit card skimming fake check scams THE

More information

Fraud Guide Fraud Protection

Fraud Guide Fraud Protection Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different

More information

SPEAR-PHISHING ATTACKS: REELING IN CORPORATE AMERICA. August 2015. Sponsored by:

SPEAR-PHISHING ATTACKS: REELING IN CORPORATE AMERICA. August 2015. Sponsored by: SPEAR-PHISHING ATTACKS: REELING IN CORPORATE AMERICA August 2015 Spear-Phishing Attacks: Reeling in Corporate America Executive Summary Criminals often find the task of exploiting a person easier than

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Red Flags in International Payments and Trade. Presented by Paul Warfield and Despina Margiori

Red Flags in International Payments and Trade. Presented by Paul Warfield and Despina Margiori Red Flags in International Payments and Trade Presented by Paul Warfield and Despina Margiori Red Flags on International Payments Financial Crimes Enforcement Network (FinCEN) alerts that Criminal organizations

More information

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 About The CAFC The Canadian Anti-Fraud Centre (CAFC) is an international call centre specializing in central sourcing complaints on mass marketing

More information

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to:

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to: GREG ABBOTT Attorney General of Texas CONTACT information For more information or to obtain copies of brochures, call the Attorney General s Consumer Protection Hotline at (800) 621-0508, or contact your

More information

Do s & Don ts Reference website. www.farmersidentityshield.com

Do s & Don ts Reference website. www.farmersidentityshield.com What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS Summary In recent years, law enforcement and regulatory authorities in Canada and the United States have seen a substantial increase

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Safeguarding Your information and accounts

Safeguarding Your information and accounts Safeguarding Your information and accounts D Bank with confidence The security of your funds and information is a top priority at Liberty Bank. We do our utmost every day to prevent fraud and identity

More information

Cyber Security: Espionage and Social Networking

Cyber Security: Espionage and Social Networking Cyber Security: Espionage and Social Networking Presented by SSA Elvis Chan San Francisco Division Why is Cyber so Important? Year World Pop. Internet Users % Online 2000 6.12 billion 413 million 6.7%

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Email Expanded Header: Viewing in Microsoft Outlook

Email Expanded Header: Viewing in Microsoft Outlook Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds

More information

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range

More information

Frequently Asked Questions [Updated January 20, 2015]

Frequently Asked Questions [Updated January 20, 2015] Frequently Asked Questions [Updated January 20, 2015] Some information in these FAQs has been provided to the Archdiocese of Portland in Oregon by the Internal Revenue Service. Note: Given the immediate

More information

RC284. Protect Yourself Against Identity Theft

RC284. Protect Yourself Against Identity Theft RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of

More information

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Protect yourself against fraud

Protect yourself against fraud With the approach of festive season and the shopping boom associated with this time of year, we would like to warn you about the ways used by fraudsters to trick unsuspecting members of the public. Here

More information

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya

Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya Paul Muriku Kanyaru 1 and Josphat K. Kyalo 2 1 BSC [Computer Science], MBA

More information

INTERNET BANKING SYSTEM AGREEMENT

INTERNET BANKING SYSTEM AGREEMENT INTERNET BANKING SYSTEM AGREEMENT Agreement - This Agreement, which includes the Fee Schedule and Enrollment Form, is a contract which establishes the rules which cover your electronic access to your accounts

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level Click to edit Master title Fighting Back Against Click to edit Master text s Presented by Fifth Office levelof Privacy, Information Protection & Data Security Identity Theft and Online Fraud 1 Click Privacy

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Top Fraud Trends Facing Financial Institutions

Top Fraud Trends Facing Financial Institutions Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond

More information

The Pennsylvania Lawyer May June 2012

The Pennsylvania Lawyer May June 2012 20 The Pennsylvania Lawyer May June 2012 How to Avoid Becoming a Victim of Phishing Be aware that scammers often use fake IRS notices or requests as bait By Phyllis Horn Epstein Cybercrime is the evil

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information