Fraudulent Funds Transfers
Bank Illegal Activities Image

Fraudulent Funds Transfers

Organizations often use email to send their employees invoices that they need to pay. Now, cybercriminals are taking advantage of this process by using fraudulent funds transfer (FFT) scams. In FFT scams, cybercriminals try to manipulate you into transferring your organization’s funds to their bank accounts.

To start an FFT scam, cybercriminals use social engineering to steal an email account from your organization. Then, they use this account to send you an email pretending to be an executive from your organization. This email lists bank account information and states that you need to send a payment to the bank account as soon as possible. If you send this payment, you won’t be paying an important invoice for your organization. Instead, you’ll be sending your organization’s money directly to cybercriminals.

Follow the tips below to stay safe from similar scams:

  • Always think before you click! Cybercriminals can use fake invoices to alarm you and trick you into clicking impulsively.
  • Never send money to a bank account provided in an email. Instead, navigate to the organization’s official website to submit a secure payment.

To verify the legitimacy of an invoice, reach out to the person who allegedly sent the email by phone or in person.


Knowbe4 Logo

Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Man Laptop Cybersecurity
Cybersecurity

SMB Cyber Targets

Majority of Cyber Incidents Now Target Small & Medium Businesses (SMBs) Cybercrime is a pervasive threat that affects individuals across all socioeconomic backgrounds, yet its

Doctor Hands Laptop Image
Ransomware

Unveiling the Human Element in Ransomware Attacks

In recent years, high-profile ransomware attacks have shaken industries and organizations worldwide. As technology advances, so do the tactics employed by threat actors. However, a

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs