Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Identity Verification – Key to Eliminate BEC Fraud

Identity Verification Key to Eliminate BEC Fraud

Fraud prevention and cybersecurity are the major concerns of the companies in the digital era. Norton predicted that cybercriminals will steal an estimated 33 billion records in 2023. And misuse of such information is a common practice. Fraud comes unannounced so the businesses need to adopt a proactive approach towards such events. Fraud prevention is a continuous process. For example, if you perform KYC and AML screening before onboarding your customers and do not practice it at the time of every transaction you are leaving a loophole for a Business Email Compromise (BEC) fraud. 

BEC fraud, also called CEO fraud is very common because most of the communication is online. The criminals do a lot of research before targeting an entity for BEC fraud. In this fraud, the criminals will send an email or make a call for urgent fund transfer to a company impersonating as one of their customers or merchants

BEC fraud is executed in a very friendly way. The criminals either manipulate the person with a friendly chat or by showing urgency in fulfillment of their fund transfer request. 

For example, 50 years old Evaldas Rimasauskas tricked Google and Facebook to wire more than $100 million to his bank accounts. 

The man researched a merchant of Facebook and Google namely, “Quanta Computer” and registered a firm with a similar name. Then he sent fake invoices and contracts to make the fraud appear more natural.  

He tricked the employees of both companies into wiring money to his bank accounts in Latvia and Cyprus. Then he transferred the funds to his bank accounts in Hong Kong, Hungary, Cyprus, Slovakia, Latvia, and Lithuania to hide the money trail. 

How is a BEC Fraud Executed?

 

A BEC fraud starts with a lot of research about entities (businesses that could be the soft targets for the fraud. The criminals collect information related to the merchants or customers of the company that has their payments pending. Once they have the information the criminals will make an email ID quite similar to that of your client’s email ID and contacts one of your employees. At times the criminals use the legitimate email ID of your customers because one of your customers might have been careless about securing their email credentials. 

This fraud could also be executed the other way round. The criminals might use your email credentials to contact your merchants and clients for fund transfer of pending payments. Your clients will make the payments and you will have to bear a financial loss if your legit email credentials are used for the execution of the fraud. 

The contact is mostly conducted through a casual email like asking about your last vacation or your health. Once they break the ice, they will send a friendly email regarding the change of their account details or for an urgent fund transfer.  

Not suspecting anything suspicious the employees often fulfill the request, quickly due to the urgency created by the criminal. 

Often the criminals send fake invoices as well with the official header or logo of one of your clients. Or they make calls impersonating as the CEO of your client company to make things look more natural. 

Also, in most of the email compromise frauds, the criminals ask for a wire transfer and leverage over the confidence that companies have in security protocols practiced in wire transfer fraud. 

Industries That Are Common Victims of BEC Fraud

Banks

 

Banks are the most common targets of BEC fraud as they are the financial intermediaries and serve a diverse clientele. Banks around the globe are struggling to retain their customers after the advent of fintech and are always in contact with their clients. Receiving wire transfer requests from customers is common for banks. When they receive any such email for urgent transfer from a credible client the employee often tries to fulfill the request at the earliest to retain happy customers. 

Real estate

 

Real estate is also a common victim. The criminals collect information regarding some ongoing real estate deals and contact the buyer as the legal representative of the seller and request a fast payment or clearance of dues. 

As the deal is in the closing phase the buyer does not suspect anything suspicious and makes the transaction. 

B2B Businesses

 

In this case, the criminals target the companies in a B2B relationship. The email ID of the CEO or legal representative of one of the companies is exploited in such cases. The criminals collect complete information regarding the previous email communication among the two companies and use it to send an email with a natural casual tone. 

How to Prevent BEC Fraud?

 

BEC fraud has caused huge losses to many businesses of all sizes and types, even the non-profit organizations have been the victims of this fraud. FBI’s Internet Crime Report (ICR) found that BEC fraud losses rose by 90.3% in 2018 and fraud complaints rose by 14.3%. 

Businesses of all types and sizes need to pay heed towards the prevention of BEC fraud. It not only cause financial loss but also affects the credibility of a company. Below are a few suggestions for preventing BEC fraud.

Identity verification of every request of wire transfer

 

Most of the businesses use online communication, but do not understand the significant risk lurking in the cyberspaces. Businesses need to develop and practice in-house fraud prevention measures to counter any BEC fraud attempt. 

Businesses should use verification methods to screen every such request. Ask the email sender to go through a real-time identity verification process every time a customer makes such a request. The verification could be performed through face recognition or 2-factor authentication. 

Online identity verification is a feasible solution as it shows quick results and does not cause any inconvenience for the end-user. Also, the visible security measures will show your commitment to the security of your merchants or customers. 

Train your employees

 

Employees of companies are the common victims of BEC frauds. The criminals choose a soft target that is easy to manipulate for wire transfer fraud or a phishing scam. 

So, the employees must be trained on a regular basis, regarding the latest trends in cybersecurity and the types of cybercrimes. This will help them to identify suspicious emails and fake fund transfer requests. 

The training could be based on the following pointers:

 

  1. Do not open any emails that are way too attractive, it might be a phishing email. 
  2. Beware of urgent payment requests from your merchants. 
  3. Tackling the account credential change request from your customers/merchants
  4. Very casual and friendly email from your merchants 
  5. Train them about the technical aspects of fraud prevention software used in your company

Report the concerned authorities 

 

As soon as you find a BEC fraud, report it to the concerned authorities. It will protect the company from such attacks in the future. Also, it is the corporate and legal responsibility of the businesses to report such fraud attempts for the benefit of the masses. 

Email security

 

Using email security filters help in analyzing and detecting any threats in the email messages. Also using the filters for detecting the newly registered domain names similar to your domain name helps in finding the potential risk before it could cause any harm. 

Such filters help in identifying and stopping spoofing emails from reaching the mailbox of the employees. 

To wrap up, BEC fraud is a planned crime and businesses need to be proactive to eliminate such frauds. Caution in sharing contact information and basic identity verification of the person making such fund transfer requests is necessary to eliminate the chances of becoming a victim of BEC fraud. In-depth verification of clients and merchants before making transactions helps in eliminating the risk at the very first stage. These minimal and easy steps might prevent a huge loss for your company.

Related Posts

Blog

How Online ID Verification Supports Age-restricted Sellers?

The online stores selling age-restricted products like gaming services, medicine or drugs are in ...

How Online ID Verification Supports Age-restricted Sellers? Explore More

Blog, Reg Tech

Shufti GDPR Review 2018: How we protected our clients from regulatory fines?

Shufti stands out in KYC industry not only because of its highly customizable and global iden...

Shufti GDPR Review 2018: How we protected our clients from regulatory fines? Explore More

Blog

The Ultimate Guide to Central Know Your Customer (CKYC)

Due to the increasing rates of financial fraud, keeping detailed data on each client is more impo...

The Ultimate Guide to Central Know Your Customer (CKYC) Explore More

Blog

Healthcare is Under Attack: Strengthening Security with Biometric Verification

Healthcare scams cost our economy tens of billions of dollars every year and the lowest value of ...

Healthcare is Under Attack: Strengthening Security with Biometric Verification Explore More

Blog, Online Marketplace

ID Verification Ensuring Safety Deals in Real Estate Sector

Buying and selling properties for people are major, thought-provoking decisions. It requires week...

ID Verification Ensuring Safety Deals in Real Estate Sector Explore More

Blog

The Latest AML Violations and the Role of Transaction Monitoring

In the evolving regulatory landscape, combating financial crimes has become a top priority of reg...

The Latest AML Violations and the Role of Transaction Monitoring Explore More

Blog

Is Your Company Safe? The Importance of Document Verification to Strengthen KYC Checks

Businesses across the globe are still vulnerable to threats like money laundering, terrorist fina...

Is Your Company Safe? The Importance of Document Verification to Strengthen KYC Checks Explore More

Blog

Global Trade and Prevalent Crimes – How Shufti’s AML Solution Can Help

International trade is exchanging services, capital, and goods across borders or territories, gen...

Global Trade and Prevalent Crimes – How Shufti’s AML Solution Can Help Explore More

Blog

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help

Metaverse is a virtual space where people belonging to the same or different physical regions can...

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help Explore More

Blog

OCR Vs. ICR: The Key Differences that Businesses Need to Know

Financial institutions need to have reliable and efficient data management. With such a system, t...

OCR Vs. ICR: The Key Differences that Businesses Need to Know Explore More

Blog, Identity & KYC

GDPR versus Identity Verification – Are you Ready?

If you are an organisation that is based in the EU or are doing business with companies in the EU...

GDPR versus Identity Verification – Are you Ready? Explore More

Blog

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA)

One of the prime concerns of businesses today is detecting and mitigating the risk of fraud. This...

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA) Explore More

Blog

Top 10 Biometric Technology Trends to Watch For in 2022

Biometric innovations in present times have manifested various technological advancements and the...

Top 10 Biometric Technology Trends to Watch For in 2022 Explore More

Blog

Improving Identity Verification Processes Through Perpetual KYC – How Shufti Helps the Banking Sector

Banks are considered a subset of the financial services industry and play the most crucial role i...

Improving Identity Verification Processes Through Perpetual KYC – How Shufti Helps the Banking Sector Explore More

Blog, Online Marketplace

Industrial significance of KYC / AML Compliance in 2019

As the type and amount of fraudulent activities have increased over the years, governments and re...

Industrial significance of KYC / AML Compliance in 2019 Explore More

Blog

De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs

Every firm providing financial services must stay put with the existing compliance and follow new...

De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs Explore More

Blog

Implementation of AML compliance – Challenges and fundamentals

With the advancement in security controls, financial businesses are becoming fraud and stress-fre...

Implementation of AML compliance – Challenges and fundamentals Explore More

Blog

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation

Traditional due diligence practices may not provide sufficient insights into higher-risk business...

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation Explore More

Blog, Fraud Prevention

ID Verification Trends to Curb Online Frauds

Automated Identity Verification Can Play a Significant Role in Fraud Management Fraud management ...

ID Verification Trends to Curb Online Frauds Explore More

Blog

Know Your Players: Why KYC is Necessary for Gaming and Gambling

The post-COVID-19 era has witnessed a remarkable surge in the e-sports and gaming sectors. This t...

Know Your Players: Why KYC is Necessary for Gaming and Gambling Explore More

Blog

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA)

One of the prime concerns of businesses today is detecting and mitigating the risk of fraud. This...

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA) Explore More

Blog

eIDAS and eIDs – The Shift in Identity Verification in the EU & Beyond

In the digital world, ensuring the security of international transactions is the ultimate goal of...

eIDAS and eIDs – The Shift in Identity Verification in the EU & Beyond Explore More

Blog

KYC alternatives disrupting traditional KYC methods

Technology is building bridges between businesses and consumers across the barriers of distance a...

KYC alternatives disrupting traditional KYC methods Explore More

Blog

Debunking the Top 7 Myths about Video KYC with CEO of Shufti

Businesses were looking for more robust and remote ways of verifying the identities of customers ...

Debunking the Top 7 Myths about Video KYC with CEO of Shufti Explore More

Blog

Kaseya Ransomware Attack – How to Protect Your Organization from Cyber Risks

Did you know that by 2021, a ransomware attack is projected to occur every 11 seconds, costing co...

Kaseya Ransomware Attack – How to Protect Your Organization from Cyber Risks Explore More

Blog

Fighting Financial Crimes and Securing Gambling Services with Shufti’s AML Screening Solution

Historically, the measures to curb money laundering and terrorist financing had only been only im...

Fighting Financial Crimes and Securing Gambling Services with Shufti’s AML Screening Solution Explore More

Blog, Business Technology

What Due Diligence Means for Your Business

Due diligence is a process that helps banks and individuals to get to know in detail who they are...

What Due Diligence Means for Your Business Explore More

Blog, Business Technology

Fraud Prevention in Fintech Industry

The FinTech industry has really made its mark in the last couple of years. FinTechs have been pro...

Fraud Prevention in Fintech Industry Explore More

Blog

5 Key Regulatory Updates for the Banking Sector in 2021

The pandemic disrupted operations in the banking sector and the criminal activities significantly...

5 Key Regulatory Updates for the Banking Sector in 2021 Explore More

Blog

Key Takeaways From Shufti’s ID Fraud Report 2021

The year 2021 was all about determining and reducing the growing number of biometric identity fra...

Key Takeaways From Shufti’s ID Fraud Report 2021 Explore More

Blog

KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces

The development of coworking platforms has led to a business transformation that brings security ...

KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces Explore More

Blog

Why Digital Identity Verification is Booming – A Detailed Insight

According to the report “Digital Identity & Document Verification Market & Technology Ana...

Why Digital Identity Verification is Booming – A Detailed Insight Explore More

Blog

Biometric Facial Recognition – Combating Identity Fraud with Shufti’s IDV Solution

Since knowledge-based authentication and passwords were first introduced, security systems in ban...

Biometric Facial Recognition – Combating Identity Fraud with Shufti’s IDV Solution Explore More

Blog

Top 5 Countries Impacted by Money Laundering – How Shufti Helps Mitigate the Risks

Today, money laundering has permeated almost every regulated market and has become the most occur...

Top 5 Countries Impacted by Money Laundering – How Shufti Helps Mitigate the Risks Explore More

Blog

Understanding Digital Identity

What is Digital Identity? In the digital world, your identity is made up of your p...

Understanding Digital Identity Explore More

Blog

AML Screening – Revealing the True Identities of Ultimate Beneficial Owners in Businesses

Hiding the Ultimate Beneficial Owners (UBOs) behind a business is never a good sign. However, som...

AML Screening – Revealing the True Identities of Ultimate Beneficial Owners in Businesses Explore More

Blog, Identity & KYC

10 Quick Tips Regarding Identity Theft Protection

Identity fraud has grown substantially in the past two decades, and unfortunately, it is here to ...

10 Quick Tips Regarding Identity Theft Protection Explore More

Blog, Identity & KYC

ICOs and KYC Compliance

With the surge in digitalisation of payments and crowdfunding; the need to set proper standards f...

ICOs and KYC Compliance Explore More

Blog

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime

Emerging FinTech firms around the world spend almost one-third of their overall budgets on develo...

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime Explore More

Blog

Blockchain Technology and KYC for Crypto Exchanges – How Shufti Can Help

KYC compliance is the backbone of the Anti-Money Laundering (AML) measures implemented by any fin...

Blockchain Technology and KYC for Crypto Exchanges – How Shufti Can Help Explore More

Blog

eIDAS and eIDs – The Shift in Identity Verification in the EU & Beyond

In the digital world, ensuring the security of international transactions is the ultimate goal of...

eIDAS and eIDs – The Shift in Identity Verification in the EU & Beyond Explore More

Blog

Cross Border Digital Payments – Regulatory Regime and the Global Context

The world is moving towards smarter payments with technology trends picking up the pace in 2021. ...

Cross Border Digital Payments – Regulatory Regime and the Global Context Explore More

Blog

Money Laundering in the Real Estate Sector – How Shufti’s AML Services Help

Purchasing luxurious mansions is always an attractive way for money launderers to legitimize thei...

Money Laundering in the Real Estate Sector – How Shufti’s AML Services Help Explore More

Blog

How AI is Transforming the Banking Sector

Artificial Intelligence has extensive applications across several domains: from banking to health...

How AI is Transforming the Banking Sector Explore More

Blog

The Top Customer Onboarding Tips for Businesses

Today every business is competing to boost their retention rate and offer their audience a secure...

The Top Customer Onboarding Tips for Businesses Explore More

Blog

Global Expansion, Digitization, and Crimes – How Shufti Can Help Financial Industry

The financial industry has seen significant technological changes over the past recent years. Man...

Global Expansion, Digitization, and Crimes – How Shufti Can Help Financial Industry Explore More

Blog

Risk Assessment – Building Trust in Financial Institutions

For financial institutions to hold onto their customers, they must build and conserve advanced le...

Risk Assessment – Building Trust in Financial Institutions Explore More

Blog

Transaction Monitoring – Establishing A Defense Mechanism Against Financial Crime

With the rapid increase in the global volume of monetary transactions, money laundering methods a...

Transaction Monitoring – Establishing A  Defense  Mechanism Against Financial Crime Explore More

Blog

Crypto KYC: A Growing Need for Industry Regulation

The recent development of cryptocurrencies has resulted in a new era of financial transactions th...

Crypto KYC:  A Growing Need for Industry Regulation Explore More

Blog

Digital customer onboarding – Revamping onboarding process in banks

The first impression is what counts most when it comes to customer-oriented services. Banks and f...

Digital customer onboarding – Revamping onboarding process in banks Explore More

Blog

Age Verification: Data Privacy and User Protection

In recent years, there’s been a lot of speculation surrounding the issue of whether or not ...

Age Verification: Data Privacy and User Protection Explore More

Blog, Identity & KYC

Why You Need To Know Your Buyer

Online payments are fast replacing cash transactions with the top payment companies harboring 1bi...

Why You Need To Know Your Buyer Explore More

Blog, Identity & KYC

Common Online Scams You Need to Know About

The explosion of the internet and the world moving towards the fourth industrial revolution have ...

Common Online Scams You Need to Know About Explore More

Blog

Biometric Identification revolutionizing the world in 2020

Every day we come face to face with new technology innovations that leave us awestruck. From the ...

Biometric Identification revolutionizing the world in 2020 Explore More

Blog

Establishing trust in Open Banking through Identity Verification

Over the last few years, open banking is becoming an emanated global trend. This rising trend is ...

Establishing trust in Open Banking through Identity Verification Explore More

Blog

KYC Verification: Eliminating Fraud from Crypto Exchanges

Despite persistent volatility, the crypto market continues to yield profits. Whilst the market wi...

KYC Verification: Eliminating Fraud from Crypto Exchanges Explore More

Anti Money Laundering, Blog, Financial Crime / AML, Identity & KYC

Know Your Business-Pillar of Strength To AML Regulations

Moving in the world of technology, where every industry is going digital, there has been very les...

Know Your Business-Pillar of Strength  To  AML Regulations Explore More

Blog

Insights Into Austria’s Biometric KYC Onboarding [2022 Updates]

Biometric authentication is considered a convenient approach for onboarding online customers that...

Insights Into Austria’s Biometric KYC Onboarding [2022 Updates] Explore More

Blog

Fighting Deepfakes with Fool-Proofed Identity Verification Systems: How Shufti Can Help

Undoubtedly, 21st century is the most innovative time period in human history. With every passing...

Fighting Deepfakes with Fool-Proofed Identity Verification Systems: How Shufti Can Help Explore More

Blog

The Ultimate KYC Checklist for 2023 to Ensure Regulatory Compliance

Non-compliance cost businesses billions of dollars. Regulators have charged financial firms with ...

The Ultimate KYC Checklist for 2023 to Ensure Regulatory Compliance Explore More

Blog

Secure the Fintech Future with RegTech

Financial Technology (Fintech) refers to the use of technological advancements in the financial i...

Secure the Fintech Future with RegTech Explore More

Blog

Brexit to Change Sanction and Money Laundering Regulations in 2021

In 2016, the United Kingdom decided to part ways with the European Union (EU). After its preparat...

Brexit to Change Sanction and Money Laundering Regulations in 2021 Explore More

Blog

Inside the EU’s New Crypto-Assets Regulatory Regime – How Shufti Can Help

With transforming technologies, the use of cryptocurrency is skyrocketing, and a large number of ...

Inside the EU’s New Crypto-Assets Regulatory Regime – How Shufti Can Help Explore More

Blog

The Crucial Role of Face Liveness Check in Fintech

Fintech firms lose approximately $51 million to scams annually. However, the cost of fintech frau...

The Crucial Role of Face Liveness Check in Fintech Explore More

Blog

Know Your Business – What Does it Mean & How can it Protect Your Company?

Businesses that offer their services to other businesses, instead of individual consumers, have t...

Know Your Business – What Does it Mean & How can it Protect Your Company? Explore More

Blog

Biometrics technology a key to key-free world

In 2016, the biometric market in the United States reached $3.52 billion U.S Dollars and is expec...

Biometrics technology a key to key-free world Explore More

Blog, Online Marketplace

The Importance of Know Your Customer for Crowd Funding and ID Verification Service

In today’s world where most business and financial transactions are taking place online, the impo...

The Importance of Know Your Customer for Crowd Funding and ID Verification Service Explore More

Blog

Online Age Verification Service: Children’s Digital Privacy amid COVID-19

The meteoric rise in the adoption of digital technology has influenced every phase of modern huma...

Online Age Verification Service: Children’s Digital Privacy amid COVID-19 Explore More

Blog

Synthetic Identity – A New Form of Identity Fraud for 2019?

Synthetic identity fraud (SIF) is a comparatively new form of identity theft that has gripped the...

Synthetic Identity – A New Form of Identity Fraud for 2019? Explore More

Blog

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help

Metaverse is a virtual space where people belonging to the same or different physical regions can...

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help Explore More

Blog

The Complete Guide | Transaction Monitoring for Financial Institutions

With technological advancement, financial criminals have also been given a wider range of tools a...

The Complete  Guide | Transaction Monitoring for Financial Institutions Explore More

Blog

Understanding Risk assessment in the Gambling Sector

The e-gambling industry has always been lucrative for gamers. However, it has also been constantl...

Understanding Risk assessment in the Gambling Sector Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started