
College summer job search ripe for fraud
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Beware fraudsters who want to masquerade as your service providers. They’ll steal purchasing information, change bank account details and trick you into paying them.
Jill is a creditor’s clerk at Organization A in South Africa. It’s month end, and she’s about to process payment of an invoice for Supplier X. She then receives an email from Hugo, the debtor’s administrator in the collections department at Supplier X, who requests payment of the R2 million rand (about US$140,803) invoice into a new bank account. He’s sent an attached confirmation letter for the new bank and other supporting documentation. Jill accepts the information and prepares a payment request for the new bank account.
The next day, the funds transfer into the new bank account. Joey, the debtor’s clerk at Supplier X, calls to say that he hasn’t received payment for services rendered. Jill sends him the proof of payment, but Joey tells her the bank account number is wrong. Jill then sends Joey the email in which the debtor’s administrator at Supplier X supposedly requested the change in banking details. Joey replies that he didn’t send the request. Jill freezes. She realizes she’s been duped.
Organizations need to be aware of this insidious change-of-banking-details fraud when perpetrators assume the identities of legitimate suppliers and divert payments of invoices into their own accounts. They do this by sending forged, altered or manipulated legitimate documents and/or emails that then flow through organizations’ normal payment systems.
Fraudsters — or sometimes organized syndicates — normally obtain personally identifiable information, such as company invoices, via email phishing attacks and spyware or from colluding insiders who’ll rummage through company mailboxes. Organizations normally only detect problems when legitimate suppliers inquire about their outstanding payments. (See “Business email compromise” at the end of this article.)
These fraudsters often pay “runners” as fronts to open bank accounts into which conned organizations unwittingly send their payments. By the time the bona fide suppliers are asking for their money, the fraudsters have withdrawn the funds in cash or transferred them into other bank accounts. They then vanish with little or no trace. The runners are identified through the banks and are sometimes apprehended but not always prosecuted because they often plead ignorance or that the fraudsters blackmailed them. Organizations lose vast amounts of money if they don’t implement the proper controls.
Here are two examples of this type of fraud that our firm has recently investigated:
As in the opening case, the fraudster paid a runner to use the runner’s bank account and then obtained information on payments to an organization’s service providers by intercepting emails and by colluding with an employee. The fraudster discovered that a service provider had sent the organization a large invoice. So, the fraudster, in the guise of the service provider, logged onto the organization’s vendor system (possibly with help from an internal accomplice) and asked to change his banking information. The organization had already unwittingly given the fraudster information that allowed him to gain access to the online system.
The fraudster convinced the organization to change the banking details of the true service provider by forging a bank confirmation letter that accompanied a letter on the service provider’s letterhead — stolen by an insider accomplice — requesting the changes. He then sent them to the organization by email or in person to the reception desk. The organization then changed the banking details and transferred payment to the amended bank account. The fraudster walked off with R250 000 (or about US$17,600).
In this case, the fraudster intercepted email correspondence between the organization and a service provider about the payment of invoices by registering a fake domain and creating a fraudulent email address that impersonated the service provider’s personnel. The fraudster then began a conversation with the organization about changing the banking details of the true service to that of his.
Below, see a typical email the fraudster would send to an organization requesting changes in banking details before submitting a final invoice for payment.
The fraudster sent a follow-up email that put pressure on the organization to meet the payment deadline to obtain early payment discounts. The organization paid the invoice and lost R510 000 (or about US$35,905). The fraudster was never caught.
Particular conditions can make organizations more susceptible to change-of-banking-details fraud:
Take these steps to minimize your risk of change-of-banking-details fraud:
Change-of-banking-details fraud is a highly prevalent threat. Minimize your organization’s risk of payment to fictitious service providers by ensuring your colleagues know the conditions that make them susceptible and help them implement the necessary precautions.
Kashmita Reddy, CFE, is forensics manager at ENSafrica in Cape Town, South Africa. Contact her at kreddy@ensafrica.com.
Sidebar: Business email compromise
The change-of-banking-detail scheme isn’t the only fraud that involves fraudsters’ misuse of email communication to fool organizational employees. In recent years, a new form of spear-phishing attack known as business email compromise (BEC) has emerged that directly targets executives or other high-ranking corporate employees who have the ability to make large payments. BEC schemes typically involve fraudulent emails that appear to be from the company’s own CEO or from the head of a foreign supplier that the company has done business with for years. The emails often instruct the employee to perform a time-sensitive wire transfer to ensure that the supply chain isn’t disturbed.
Increasingly, fraudsters pair these emails with insistent phone calls from someone posing as the email senders or as the senders’ attorneys.
In May 2017, the FBI released a bulletin about a sharp increase in the number of BEC schemes in the U.S. with a total of $5 billion in losses reported from October 2013 to December 2016. (See Business E-Mail Compromise, E-Mail Account Compromise: The 5 Billion Dollar Scam.)
Although these schemes can take numerous forms, the FBI has identified five common scenarios for BEC schemes:
These schemes are often successful because employees want to satisfy their superiors or business associates and are intimidated into action without verification.
Source: Online ACFE Fraud Examiners Manual, Section 1: Financial Transaction and Fraud Schemes, Computer Hacking.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 6 mins
Written By:
Felicia Riney, D.B.A.
Read Time: 7 mins
Written By:
Patricia A. Johnson, MBA, CFE, CPA
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 6 mins
Written By:
Felicia Riney, D.B.A.
Read Time: 7 mins
Written By:
Patricia A. Johnson, MBA, CFE, CPA