Desktop Banner

Mobile Banner

Being ‘scam savvy’ in the cyber world

Cyber crime is a serious threat to organisations. With many of us working online, to protect yourself and your organisation it is more important than ever that you, as the first line of defence, are aware of scams.

Cyber criminals are firmly focused on the UK market. The past couple of years have seen the threat amplified by the coronavirus pandemic as cyber criminals try to capitalise on the chaos. Our 2022 Cyber Security survey found that more than a quarter of organisations had experienced a cyber-attack in the last 12 months, up from 20 per cent in 2021.

95 per cent of cyber security breaches are due to human error, so user behaviour and education is the best way to protect your organisation against many of the most common scams.

In this series we highlight some of the scams we see across our client base. We aim to equip you and your teams with the knowledge and training required to avoid scams and online fraud.

Cyber security – first line of defence

Staff are usually the first line of defence against cybercrime. With the right training and guidance, employees can help prevent cyber attacks against your organisation.

It is important that your staff know what to do if they receive a suspicious email:

Staff will also need to have in place strong passwords that are different for each account, and use the following as a guide:

Scams and phishing attempts are not always in the form of an email, but can be a text message, phone call or social media contact.

You can report all suspicious forms of contact to Action Fraud.

If you have inadvertently clicked on a link or provided your details, advise the IT Security team at the earliest opportunity, and consider changing passwords immediately. If you have made payment and are concerned, you must contact the bank without delay as they can sometimes put a stop to the payment.

Payment diversion fraud

Payment diversion fraud is exactly what it sounds like. Typically, a link is emailed to an employee. The link often appears to be to their employer’s self-service login page but is in fact to a spoof website set up by the fraudster. The spoof records the employee’s username and password, and the fraudster uses this information to divert the employee’s salary payments into their own bank account.

These emails often use overly formal language and incentivise the employee to click the link, often with the ‘notification’ of a generous pay increase or an issue with their pay.

For example:

In accordance with the Fiscal Year 2022 Salary Allocation Guidelines (SAG) kindly be informed that your monthly salary starting April 2022 will reflect a 12.36 percent salary increase. Your new salary is analysed herewith. All documents are enclosed hereunder: view documents here Your monthly salary starting from April 2022 will be raised by 13.84%. Enclosed is your salary increase letter. Download and keep a copy for your records. **when prompted, your date of birth on records must be authenticated**. View letter here. Finance have noticed some irregularities on your payslip and P60 form which may impact your January salary. Report is as attached. Kindly download and update accordingly as highlighted. **this is a secure document, hence authentication will be required**.

Actions to take

Email interception

Organised crime groups use viruses and other malware to hack into suppliers’ email accounts, then intercept communications between suppliers and the organisations they work with. Common methods of email interception include phishing emails that target specific staff members, spoofing a genuine supplier’s email account, and installing malware on a supplier’s devices.
Fraudsters intercept the emails and can then make changes to their contents, eg adding a line to request that future payments for products or services be paid into an account controlled by the fraudster.

Actions to take

Mandate fraud

In a mandate fraud, fraudsters contact organisations posing as one of their existing suppliers. They request a change to the genuine supplier’s phone number, then at a later date ask for a change to the supplier’s bank mandate. In this way, call-back checks from the bank are made to the fraudster and the supplier remains unaware of the fraud.

Actions to take

• Raise awareness of bank mandate fraud, and especially ask that employers flag when suppliers request changes to their phone numbers.
• Before responding, check the details of the person making the request and the supplier’s details.
• Requests to change a bank mandate should follow your own organisation’s procedures.

When you receive an email, hover your cursor over the sender’s address and any links in the email. This ‘hover test’ displays the true email address the message has come from and the actual destination of the hyperlinks. It also pays to check that the email address shown is an organisation’s correct email address eg is spelt correctly.

Spotting a targeted phishing email

Cyber scam email example 1

Cyber scam email example 2

Fake emails often display some of the following characteristics:

How we can help you to protect your organisation from cyber fraud

Taking a considered approach to cyber fraud will ensure you provide your organisation and your employees with the tools to defend against scams, cyber fraud and other digital crime.

For more information or help for your organisation, please contact:

authors:andrea-deegan,authors:erin-sims,authors:richard-curtis