
Greedy company president sinks family-owned firm
Read Time: 6 mins
Written By:
Robert J. Gunderson, CFE
This case is fictional, but it represents fraudsters’ attempts to steal personally identifiable information (PII) with a new inheritance scam, reported by the Federal Trade Commission (FTC) in a consumer alert.
Fraudsters initiate the inheritance scam by sending letters from fake law firms that tell potential victims they might be heirs to substantial inheritances. If a recipient is identified as an heir, they must split the fortune with the law firm and designated charities. Victims are told to wire money to cover fees and send their SSNs and bank account numbers to the “law firms.”
The fraudsters tell victims to reply via email immediately and not share the letter to avoid the risk of family members and friends uncovering the scam. This common strategy — a page out of the fraudsters’ playbook — increases their return on investment. (See “Contacted about a long-lost relative’s inheritance? Hold on a minute,” by Joseph Ferrari, FTC, Aug. 10, 2022.)
The FTC offers advice:
Educate members of your local community, report the scam to local law enforcement authorities and media outlets.
The FTC publishes alerts like this when it receives a large amount of victims’ complaints on a particular scam. That’s why it’s so important to report scams to the FTC as soon as they emerge so the agency can track trends, educate the community and share the information with law enforcement.
Phishing schemes, typically delivered via email messages, are a major ploy of cybercriminals to breach organizations and compromise their data. Brian Stone, writing on TechRepublic, cites Kaspersky study data that “nearly all (91%) of cyberattacks [begins] with an attempted phishing email …” (See “Have you ever found phishing emails confusing? You aren’t alone,” by Brian Stone, TechRepublic, June 30, 2022.) Many cyberattacks lead to ransomware problems in which organizations ultimately pay huge sums of money to unlock their files.
Organizations, none of which are immune to ransomware attacks, must constantly back up files that contain sensitive information. And because phishing schemes are so lucrative, cybercriminals are always improving them to confuse and trick victims. To help improve data security and keep safe, organizations must continually educate their employees to identity and eliminate potential data breaches before they occur.
Organizations develop phishing simulation procedures as a component of ongoing cybersecurity training programs. Trainers periodically send fake email phishing messages to employees. This training will help to reduce the confusion and panic that employees face when fraudsters attack systems.
Employees are often more likely to click on spear-phishing email messages directly to them purportedly from their supervisors or others in their organizations. The internal victims normally trust (or fear!) the senders, so they’ll often click on attachments and begin ransomware fevers.
And Stone wrote, citing phishing simulator data from Kaspersky’s Security Platform, that “16% to 18% of employees will click an email template sent by an adversary that appears on the surface to be delivery issues or tech related errors.” The subject line of the five most clicked-on emails found by Kaspersky in its phishing simulator program were:
“The employees [in the Kaspersky study] skimmed these subjects on a surface level, as they appeared to be coming from reliable sources such as the company’s HR department or Google, but these were carefully crafted email templates attempting to pass off as legitimate,” Stone wrote. Additional phishing subjects that garnered clicks, according to Kaspersky, were reservation confirmations from a booking service (11%), a notification about an order placement (11%), and an IKEA contest announcement (10%). (See “Have you ever found phishing emails confusing? You aren’t alone,” by Brian Stone, TechRepublic, June 30, 2022 and “Kaspersky reveals phishing emails that employees find most confusing,” Kaspersky, June 27, 2022.)
A good cybersecurity training program includes education of employees to spot suspicious subject lines in email messages and other typical signs of fraudulent email messages, such as grammatical errors, sender addresses and unknown links. Employees should be taught to report any suspicious email messages to their IT departments so they can share with other employees and avoid becoming victims. Organizations should also provide updated antivirus software for employees’ devices.
Scammers are very good at what they do and can be very convincing. Their delivery methods to grab your money and PII include text messages, telephone and email. Your money might be gone forever, but don’t give up. It’s worth trying to contact the company you used to send your money to get it back.
The FTC provides help to regain your money, PII or access to your computer or phone:
Please use information about these scams in your outreach programs and among your family members, friends, and co-workers.
As part of my outreach program, please contact me if you have any questions on identity theft or cyber-related issues that you need help with or if you would like me to research a scam and possibly include details in future columns or as feature articles.
I don’t have all the answers, but I’ll do my best to help. I might not get back to you immediately, but I’ll reply. Stay tuned!
Robert E. Holtfreter, Ph.D., CFE, is a distinguished professor of accounting and research at a university in the U.S. Northwest. He’s a member of the Accounting Council for the Gerson Lehrman Group, a research consulting organization, and a member of the White Collar Crime Research Consortium Advisory Council. He’s also the vice president of the ACFE Pacific Northwest Chapter and serves on the ACFE Advisory Council and the Editorial Advisory Committee. Holtfreter was the recipient of the Hubbard Award for the best Fraud Magazine feature article in 2016. Contact him at doctorh007@gmail.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 6 mins
Written By:
Robert J. Gunderson, CFE
Read Time: 7 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 7 mins
Written By:
Dorothy Riggs, CFE
Read Time: 6 mins
Written By:
Robert J. Gunderson, CFE
Read Time: 7 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 7 mins
Written By:
Dorothy Riggs, CFE