Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Identity Verification – Key to Eliminate BEC Fraud

Identity Verification Key to Eliminate BEC Fraud

Fraud prevention and cybersecurity are the major concerns of the companies in the digital era. Norton predicted that cybercriminals will steal an estimated 33 billion records in 2023. And misuse of such information is a common practice. Fraud comes unannounced so the businesses need to adopt a proactive approach towards such events. Fraud prevention is a continuous process. For example, if you perform KYC and AML screening before onboarding your customers and do not practice it at the time of every transaction you are leaving a loophole for a Business Email Compromise (BEC) fraud. 

BEC fraud, also called CEO fraud is very common because most of the communication is online. The criminals do a lot of research before targeting an entity for BEC fraud. In this fraud, the criminals will send an email or make a call for urgent fund transfer to a company impersonating as one of their customers or merchants

BEC fraud is executed in a very friendly way. The criminals either manipulate the person with a friendly chat or by showing urgency in fulfillment of their fund transfer request. 

For example, 50 years old Evaldas Rimasauskas tricked Google and Facebook to wire more than $100 million to his bank accounts. 

The man researched a merchant of Facebook and Google namely, “Quanta Computer” and registered a firm with a similar name. Then he sent fake invoices and contracts to make the fraud appear more natural.  

He tricked the employees of both companies into wiring money to his bank accounts in Latvia and Cyprus. Then he transferred the funds to his bank accounts in Hong Kong, Hungary, Cyprus, Slovakia, Latvia, and Lithuania to hide the money trail. 

How is a BEC Fraud Executed?

 

A BEC fraud starts with a lot of research about entities (businesses that could be the soft targets for the fraud. The criminals collect information related to the merchants or customers of the company that has their payments pending. Once they have the information the criminals will make an email ID quite similar to that of your client’s email ID and contacts one of your employees. At times the criminals use the legitimate email ID of your customers because one of your customers might have been careless about securing their email credentials. 

This fraud could also be executed the other way round. The criminals might use your email credentials to contact your merchants and clients for fund transfer of pending payments. Your clients will make the payments and you will have to bear a financial loss if your legit email credentials are used for the execution of the fraud. 

The contact is mostly conducted through a casual email like asking about your last vacation or your health. Once they break the ice, they will send a friendly email regarding the change of their account details or for an urgent fund transfer.  

Not suspecting anything suspicious the employees often fulfill the request, quickly due to the urgency created by the criminal. 

Often the criminals send fake invoices as well with the official header or logo of one of your clients. Or they make calls impersonating as the CEO of your client company to make things look more natural. 

Also, in most of the email compromise frauds, the criminals ask for a wire transfer and leverage over the confidence that companies have in security protocols practiced in wire transfer fraud. 

Industries That Are Common Victims of BEC Fraud

Banks

 

Banks are the most common targets of BEC fraud as they are the financial intermediaries and serve a diverse clientele. Banks around the globe are struggling to retain their customers after the advent of fintech and are always in contact with their clients. Receiving wire transfer requests from customers is common for banks. When they receive any such email for urgent transfer from a credible client the employee often tries to fulfill the request at the earliest to retain happy customers. 

Real estate

 

Real estate is also a common victim. The criminals collect information regarding some ongoing real estate deals and contact the buyer as the legal representative of the seller and request a fast payment or clearance of dues. 

As the deal is in the closing phase the buyer does not suspect anything suspicious and makes the transaction. 

B2B Businesses

 

In this case, the criminals target the companies in a B2B relationship. The email ID of the CEO or legal representative of one of the companies is exploited in such cases. The criminals collect complete information regarding the previous email communication among the two companies and use it to send an email with a natural casual tone. 

How to Prevent BEC Fraud?

 

BEC fraud has caused huge losses to many businesses of all sizes and types, even the non-profit organizations have been the victims of this fraud. FBI’s Internet Crime Report (ICR) found that BEC fraud losses rose by 90.3% in 2018 and fraud complaints rose by 14.3%. 

Businesses of all types and sizes need to pay heed towards the prevention of BEC fraud. It not only cause financial loss but also affects the credibility of a company. Below are a few suggestions for preventing BEC fraud.

Identity verification of every request of wire transfer

 

Most of the businesses use online communication, but do not understand the significant risk lurking in the cyberspaces. Businesses need to develop and practice in-house fraud prevention measures to counter any BEC fraud attempt. 

Businesses should use verification methods to screen every such request. Ask the email sender to go through a real-time identity verification process every time a customer makes such a request. The verification could be performed through face recognition or 2-factor authentication. 

Online identity verification is a feasible solution as it shows quick results and does not cause any inconvenience for the end-user. Also, the visible security measures will show your commitment to the security of your merchants or customers. 

Train your employees

 

Employees of companies are the common victims of BEC frauds. The criminals choose a soft target that is easy to manipulate for wire transfer fraud or a phishing scam. 

So, the employees must be trained on a regular basis, regarding the latest trends in cybersecurity and the types of cybercrimes. This will help them to identify suspicious emails and fake fund transfer requests. 

The training could be based on the following pointers:

 

  1. Do not open any emails that are way too attractive, it might be a phishing email. 
  2. Beware of urgent payment requests from your merchants. 
  3. Tackling the account credential change request from your customers/merchants
  4. Very casual and friendly email from your merchants 
  5. Train them about the technical aspects of fraud prevention software used in your company

Report the concerned authorities 

 

As soon as you find a BEC fraud, report it to the concerned authorities. It will protect the company from such attacks in the future. Also, it is the corporate and legal responsibility of the businesses to report such fraud attempts for the benefit of the masses. 

Email security

 

Using email security filters help in analyzing and detecting any threats in the email messages. Also using the filters for detecting the newly registered domain names similar to your domain name helps in finding the potential risk before it could cause any harm. 

Such filters help in identifying and stopping spoofing emails from reaching the mailbox of the employees. 

To wrap up, BEC fraud is a planned crime and businesses need to be proactive to eliminate such frauds. Caution in sharing contact information and basic identity verification of the person making such fund transfer requests is necessary to eliminate the chances of becoming a victim of BEC fraud. In-depth verification of clients and merchants before making transactions helps in eliminating the risk at the very first stage. These minimal and easy steps might prevent a huge loss for your company.

Related Posts

Blog, Fraud Prevention, Online Marketplace

Why Digital KYC is Important for Insurance Fraud Prevention

KYC For Insurance Companies : Basically, a system that can carry out real-time identity verificat...

Why Digital KYC is Important for Insurance Fraud Prevention Explore More

Blog

Safeguarding the Art Market with Shufti’s AML Screening Solution

Non-fungible tokens (NFTs), blockchain-powered title deeds tied to a virtual or physical asset, h...

Safeguarding the Art Market with Shufti’s AML Screening Solution Explore More

Blog

Identity Verification making online dating platforms secure

The expansion of the internet and mobile devices has led to the rapid adoption of online dating. ...

Identity Verification making online dating platforms secure Explore More

Blog

Shufti’s Secret to Acquiring 92% End-User Satisfaction Rate

Shufti, the global identity verification service provider, started from humble beginnings wit...

Shufti’s Secret to Acquiring 92% End-User Satisfaction Rate Explore More

Blog

Russian Sanctions Evasion – Is the Art Industry the Next Target for Money Laundering?

As regulatory authorities are seizing the yachts and real estate belonging to Russian oligarchs, ...

Russian Sanctions Evasion – Is the Art Industry the Next Target for Money Laundering? Explore More

Blog

Digital COVID Pass: Automated COVID Report Verification

The worsening situation of the pandemic has forced authorities to impose restrictions on several ...

Digital COVID Pass: Automated COVID Report Verification Explore More

Blog, Financial Crime / AML

Impact of Bitcoin Addresses’ Sanctions on IDV Providers

The technology enhancement is being done at an exponential rate around the world. As the tech kee...

Impact of Bitcoin Addresses’ Sanctions on IDV Providers Explore More

Blog

Securing Banks and Curbing Financial Crimes with Shufti AML/KYC Solution

Banks and other financial institutions constantly face the challenges of tackling financial crime...

Securing Banks and Curbing Financial Crimes with Shufti AML/KYC Solution Explore More

Blog

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation

Traditional due diligence practices may not provide sufficient insights into higher-risk business...

EDD: Safeguarding Business Interests with Comprehensive Risk Mitigation Explore More

Blog

Biometric Authentication – How Do Fraudsters Try to Bypass These Checks?

Biometric authentication is one of the ideal ways of dealing with fraudsters. Unfortunately, crim...

Biometric Authentication – How Do Fraudsters Try to Bypass These Checks? Explore More

Blog, Online Marketplace

Nordic Banks brace for Digital KYC with centralized Database

Five major Nordic banks have formed a partnership to establish a company that will compile a cent...

Nordic Banks brace for Digital KYC with centralized Database Explore More

Blog

A Detailed Insight into the Best Practices for Digital Currency Providers

The world has seen an overwhelming rate of development in the cryptocurrency sector with Centrali...

A Detailed Insight into the Best Practices for Digital Currency Providers Explore More

Blog

Know your transactions (KYT) boosts your KYC efforts

Integration problems, lack of adequate attributes, and how Know Your Customers (KYC) are handled,...

Know your transactions (KYT) boosts your KYC efforts Explore More

Blog

Understanding Digital Identity

What is Digital Identity? In the digital world, your identity is made up of your p...

Understanding Digital Identity Explore More

Biometric Technology, Blog

Warning: You’re Losing Money by not Using Biometric Identification

On the surface, Biometric Identification might seem as if it’s only useful for opening your bank ...

Warning: You’re Losing Money by not Using Biometric Identification Explore More

Blog

AML and KYC Compliance – Big Data Optimising the Regulatory Landscape

Today, different sectors face an influx of user data that they need to process and analyse. To de...

AML and KYC Compliance – Big Data Optimising the Regulatory Landscape Explore More

Blog

The Significance of Age Verification in the Digital Space

With the innovation of technology, digital services among younger audiences are becoming increasi...

The Significance of Age Verification in the Digital Space Explore More

Blog

Future Prediction of Identity Verification for Businesses

Ensuring a user’s real identification has become crucial in the age of digitisation. Busine...

Future Prediction of Identity Verification for Businesses Explore More

Blog

Top 5 Trends for the Government Sector in 2022

With the emergence of the new variant of COVID-19 “Omicron” in South Africa, it is possible that ...

Top 5 Trends for the Government Sector in 2022 Explore More

Blog

5 Key Market Trends in Identity Verification

The year 2020 has caused a dramatic shift in the business industry and our way of living.  The si...

5 Key Market Trends in Identity Verification Explore More

Blog

5 Best Practices to Combat Identity Fraud on Social Media Platforms

Social media has demonstrated extraordinary growth in the past decade as a result of improvements...

5 Best Practices to Combat Identity Fraud on Social Media Platforms Explore More

Artificial Intelligence, Blog

How Augmented Intelligence is next stop in ID Verification Services?

Augmented intelligence (AI), also referred to as intelligence augmentation (IA) and cognitive aug...

How Augmented Intelligence is next stop in ID Verification Services? Explore More

Blog

Identity Fraud and Risk Assessment: An Ultimate Guide for 2023

Customer onboarding and business relationships always come with associated risks that must be han...

Identity Fraud and Risk Assessment: An Ultimate Guide for 2023 Explore More

Blog

Protect Your Business Against Identity Theft with Face ID Check

The efficacy of biometric authentication becomes questionable in the face of facial ID checks. It...

Protect Your Business Against Identity Theft with Face ID Check Explore More

Blog

Understanding the Difference Between Money Laundering and Embezzlement

Money laundering and embezzlement are two financial offences involving the movement of significan...

Understanding the Difference Between Money Laundering and Embezzlement Explore More

Blog

What is KYC and Why is it Important for Crypto Exchanges?

 Cryptocurrencies are causing significant disruptions in the financial world. Cryptograp...

What is KYC and Why is it Important for Crypto Exchanges? Explore More

Blog

7 Ways to Protect Business and Remote Staff from Cybercriminals

Businesses are facing ‘new normal’ as the workplace has shifted from offices to homes amid corona...

7 Ways to Protect  Business and Remote Staff from Cybercriminals Explore More

Blog

The Complete Guide | Identifying Fake Documents

Many application processes have become easier and faster due to digital transformation. This is b...

The Complete Guide | Identifying Fake Documents Explore More

Blog

The Latest KYC Regulation Bill for Bitcoin ATMs and DeFi Platforms

As the digital revolution takes hold worldwide, there has been an unparalleled surge in the adopt...

The Latest KYC Regulation Bill for Bitcoin ATMs and DeFi Platforms Explore More

Blog

Money Laundering Through Cryptocurrency: Red Flags and AML Risks

As the use of virtual assets becomes widespread, crypto firms have a major dilemma to deal with &...

Money Laundering Through Cryptocurrency: Red Flags and AML Risks Explore More

Blog

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA)

One of the prime concerns of businesses today is detecting and mitigating the risk of fraud. This...

10 Ways to Eliminate Business Fraud with Robotic Process Automation (RPA) Explore More

Blog

Understanding AML Sanction Lists: Key Global Regimes and their Importance

Sanction lists are expanding regularly and sanctions imposed by different authorities do not alwa...

Understanding AML Sanction Lists: Key Global Regimes and their Importance Explore More

Blog, Business Technology, Financial Crime / AML, Identity & KYC

AML Technology Eradicating the Perils of Money Laundering

In the past few years, we have seen a substantial increase in the number of legislations regardin...

AML Technology Eradicating the Perils of Money Laundering Explore More

Blog

Russian Sanctions Evasion – Is the Art Industry the Next Target for Money Laundering?

As regulatory authorities are seizing the yachts and real estate belonging to Russian oligarchs, ...

Russian Sanctions Evasion – Is the Art Industry the Next Target for Money Laundering? Explore More

Blog, Online Marketplace

Verify ID For a Secure Travel Experience

Since we are using the Internet for a great many things including shopping to online booking of f...

Verify ID For a Secure Travel Experience Explore More

Blog

Basel AML Index 2021 – Evaluating the Risk of Money Laundering Worldwide

 The threat for money laundering and terror financing continue to increase with global a...

Basel AML Index 2021 – Evaluating the Risk of Money Laundering Worldwide Explore More

Blog

10 Reasons Why Businesses Should Choose Shufti

Started in 2017, Shufti Ltd. has attained a lot of success. Within three years, we have onboa...

10 Reasons Why Businesses Should Choose Shufti Explore More

Blog

The US Corporate Transparency Act – What’s New? [December 2022]

Generally, small to medium businesses in the US continue operating without disclosing the benefic...

The US Corporate Transparency Act – What’s New? [December 2022] Explore More

Blog, Identity & KYC

Cybercrimes Rise 5 times in 4 years and Continue to Soar!

 A rapid stride in the tech world over the years has increased cybercrimes immensely. According t...

Cybercrimes Rise 5 times in 4 years and Continue to Soar! Explore More

Biometric Technology, Blog

Online Facial Recognition Could Drive a New Wave of Digital Transparency

Online facial recognition is a much less explored territory when it comes to online identity veri...

Online Facial Recognition Could Drive a New Wave of Digital Transparency Explore More

Blog

Analyzing and Balancing the Variables of an Effective Identity Verification Solution

Today’s constantly transforming digital landscape where technology empowers businesses fast-paced...

Analyzing and Balancing the Variables of an Effective Identity Verification Solution Explore More

Blog

A Detailed Insight into Due Diligence for SMEs in Europe

Recent developments in due diligence legislations have prompted debate on SMEs being subject to t...

A Detailed Insight into Due Diligence for SMEs in Europe Explore More

Blog

Post COVID-19 – What are the alternatives to fingerprint biometrics for identity verification?

The way things are headed, there is no doubt about the fact that the world will be a different pl...

Post COVID-19 – What are the alternatives to fingerprint biometrics for identity verification? Explore More

Blog

Securing FinTech Startups using Shufti’s AML/KYC Solution

Financial technology commonly known as FinTech is rapidly growing across the globe with a lot of ...

Securing FinTech Startups using Shufti’s AML/KYC Solution Explore More

Anti Money Laundering, Blog, Business Technology, Financial Crime / AML, Identity & KYC

Global Economies are joining forces with FATF against money laundering

Financial Action Task Force (FATF) has been very keen on eliminating financial crime (money laund...

Global Economies are joining forces with FATF against money laundering Explore More

Blog

5 Best Practices to Combat Identity Fraud on Social Media Platforms

Social media has demonstrated extraordinary growth in the past decade as a result of improvements...

5 Best Practices to Combat Identity Fraud on Social Media Platforms Explore More

Blog, Online Marketplace

12 Ways Identity Verification Services Helping Online Businesses

The online marketplace has a culminating presence in the business world. Worldwide e-commerce sal...

12 Ways Identity Verification Services Helping Online Businesses Explore More

Blog

Anti-Money Laundering Solutions | Helping Businesses Fight Against Financial Crimes

In today’s digital world, increased financial crimes adversely impact global industries, mainly t...

Anti-Money Laundering Solutions | Helping Businesses Fight Against Financial Crimes Explore More

Blog

European Payments Initiative Calling for IDV Solutions

The rise in the popularity of Visa and Mastercard in Europe, both US-headquartered companies, was...

European Payments Initiative Calling for IDV Solutions Explore More

Blog

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status

Proof of income is a vital requirement in many financial and professional contexts. Recently, the...

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status Explore More

Blog

Address Verification: Types, Benefits, and Best Practices

Improving customer service and combating fraud frequently requires swiftly gathering and confirmi...

Address Verification: Types, Benefits, and Best Practices Explore More

Blog, Identity & KYC

CRA Looking to Launch Digitally Secure Ways with Identity Verification Services

Canada Revenue Agency or CRA in collaboration with an identity verification service called Secure...

CRA Looking to Launch Digitally Secure Ways with Identity Verification Services Explore More

Blog, Financial Crime / AML

Impact of Canada’s Evolving AML Regimes on Your Business

Canada’s AML regulations changed a lot in 2019. More rigid AML regulations are imposed on all typ...

Impact of Canada’s Evolving AML Regimes on Your Business Explore More

Blog

Leveling Up Identity Verification To Meet This Moment

Companies around the world contend with two digital identity challenges that seem mutually exclus...

Leveling Up Identity Verification To Meet This Moment Explore More

Blog

Transaction Screening: The Benefits and Challenges

Financial crimes are rising, wreaking havoc on organisations and individuals. The fraud rate has ...

Transaction Screening: The Benefits and Challenges Explore More

Blog, Online Marketplace

How Car Rentals can safeguard their interest with Digital KYC?

Car rentals stand to benefit a great deal from Digital KYC as it will enable them to verify the c...

How Car Rentals can safeguard their interest with Digital KYC? Explore More

Blog

Anti Money Laundering – What is AML compliance and why is it important?

Anti-money laundering compliance is vital for obliged entities and being conversant with AML comp...

Anti Money Laundering – What is AML compliance and why is it important? Explore More

Blog, Fraud Prevention, Online Marketplace

5 Industries Where Anti Fraud Solutions are Gaining Prominence

Every profit generating business has some level of risk of falling victim to fraudulent activitie...

5 Industries Where Anti Fraud Solutions are Gaining Prominence Explore More

Blog

5 reasons why passwords are no more safe – What’s next?

Online platforms are using passwords to secure the privacy and data of their users – but ar...

5 reasons why passwords are no more safe – What’s next? Explore More

Blog

Electronic Identity Verification | Forecasts and Predictions

Identities change as the world goes more digital. As more activities, like banking, socialising, ...

Electronic Identity Verification | Forecasts and Predictions Explore More

Blog, Business Technology

Biometric Verification – Shaping the Future of Payments

Today’s world is no longer different from the science fiction world. With the advent of technolog...

Biometric Verification – Shaping the Future of Payments Explore More

Blog

Identity verification for fair and free US elections amid COVID-19

US Elections 2020 is the talk of the town these days. But with COVID-19 pandemic going on how wil...

Identity verification for fair and free US elections amid COVID-19 Explore More

Blog

Securing Public Facilities with Touchless ID Verification Kiosks

Due to the coronavirus pandemic, social distancing became the utmost need of the hour. Given the ...

Securing Public Facilities with Touchless ID Verification Kiosks Explore More

Blog

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime

Emerging FinTech firms around the world spend almost one-third of their overall budgets on develo...

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime Explore More

Blog

Worldwide Language Coverage from Shufti helps you go Global

Language serves the purpose of communication among people of a certain locality, nation or in cas...

Worldwide Language Coverage from Shufti helps you go Global Explore More

Blog

5 Things Businesses Should Know about PEP Screening

Regulators levy penalties when compliance programs fail or companies have insufficient compliance...

5 Things Businesses Should Know about PEP Screening Explore More

Blog

KYC For Sharing Economy – Building a Safe & Trusted Environment that Retains Customers

“Sharing Economy” is a term that has become popular in recent years, and the current digital worl...

KYC For Sharing Economy – Building a Safe & Trusted Environment that Retains Customers Explore More

Anti Money Laundering, Blog, Financial Crime / AML, Reg Tech

EU’s Sixth Anti-Money Laundering Directive (AMLD6)

Summary: Sixth Anti-Money Laundering Directive (AMLD6) highlights a stringent framework to combat...

EU’s Sixth Anti-Money Laundering Directive (AMLD6) Explore More

Blog

The Role of Digital Identity in Business-Customer Relationship

Dealing with any business online have you ever wondered where this relationship would go? We all ...

The Role of Digital Identity in Business-Customer Relationship Explore More

Blog

Prevailing Identity Fraud in Telecom Sector – How Shufti Can Reduce the Risks

The telecommunication industry holds significance for the information sector as it is primary inf...

Prevailing Identity Fraud in Telecom Sector – How Shufti Can Reduce the Risks Explore More

Blog

Address Verification: The Cornerstone of Elevating Customer Experience

Today’s highly emerging technology is changing the way consumers shop online products. Given the ...

Address Verification: The Cornerstone of Elevating Customer Experience Explore More

Blog

6 Upcoming Trends In Blockchain And Cryptocurrency For 2021

2020 was unlike any other year. It was chaotic, happening, and has finally come to an end. In the...

6 Upcoming Trends In Blockchain And Cryptocurrency For 2021 Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started