Knowledge Center

  • RSS Feed
  • Contact
  • Print

KNOWLEDGE CENTER >

Corporate Account Take Over – The Latest Cyber Crime

March 05, 2010

By Richard P. Finkel
Partner
BlumShapiro

The alarm has been sounded; online crime was up by 600% in 2009.

A large portion of that increase was in the area of electronic funds transfers placed through the Automated Clearing House ("ACH").  Late last year the Electronic Payment Association (NACHA) and the Internet Crime Complaint Center (iC3) issued warnings about what has come to be known as Corporate Account Takeover.

In a Corporate Account Takeover, a business finds that, virtually overnight, funds have been stripped from its bank accounts by cyber thieves.  These cyber thieves are gaining access to, and control of, business bank accounts by stealing valid on-line credentials and initiating ACH transfers, usually in amounts less than $10,000 in order to avoid detection.

Through October 2009, reports of attempted Corporate Account Takeovers totaled approximately $85 million, with actual losses of approximately $40 million.  In one published case in which a Midwest non-profit organization was targeted, cyber thieves executed an ACH batch file of 16 separate debit transfers, each less than $9,000, for a total of over $142,000.  In another published case, a small California company was hit with 17 ACH transfers totaling almost $100,000, resulting in a loss of $48,000.

How It Works

In most cases of Corporate Account Takeover, the subject company's computers are infected with malicious software ("Malware").  Malware is often transferred through an email which contains links to websites or has documents attached.  Clicking on these links or opening these documents downloads the Malware to the subject computer, providing the cyber thieves with a portal through which they can capture and observe the company's online activity.

Malware can also come from visiting legitimate websites, especially social networking sites, by viewing pictures, videos or documents.  Once installed, the Malware harvests information by logging keystrokes and capturing IDs and Passwords when users log in to their bank's website.  From there, the cyber thieves can create additional user accounts from the stolen credentials or initiate the transfer(s) of funds. 

In an effort to hide these activities, the cyber thieves set up what is known as a Money Mule Network.  Money mules are people recruited to assist the cyber thieves in transferring money out of the country.  They are recruited through Work-at-Home advertisements or through popular on-line employment sites.  In one particular mule network, the cyber thieves hired individuals with the job title of regional clerk.  The job description was to assist a Switzerland-based insurance company in distributing reimbursements to policy holders via wire transfers.  Although these new employees were supplied with elaborate employee handbooks, the Swiss company did not exist.  Once hired, the mules are instructed to open a bank account to receive money transfers.  Soon thereafter, money is deposited via ACH, and the mule is instructed to forward the money, typically to accounts in Eastern Europe and Asia via wire transfers services, including Western Union and Moneygram.  The transfers are usually initiated in amounts less than $10,000, and the mule is allowed to retain 5% as a commission. 

The FBI reports that the most likely targets are small- to medium-sized companies, schools,
non-profit organizations and government agencies.  The targets are often identified from websites which list contact information and organizational charts.  From these websites, the thieves can identify the individuals in the organization who may be handling financial transactions and then direct the Malware attack to those individuals.

Prevention

Although consumers have 60 days to notify their banks of unauthorized electronic transfers, businesses must be more vigilant to catch these transactions before the funds disappear.  Reporting the fraudulent activity by midnight of the next day may allow for the transaction to be reversed before the cyber thieves cash in.  

Simple strategies include daily reconciliation of cash accounts, initiating transfers from workstations restricted for financial transaction use only and the use of positive pay, which involves providing an authorized list of disbursements to one's bank in advance.

The best way to deal with fraud is to prevent it.  Organizations should engage experienced professionals to undertake a Fraud Risk Assessment to proactively identify both internal and external fraud risks and to develop cost-effective fraud prevention and detection policies and procedures.  Any assessment program starts with determining a business/organization's risk tolerance and developing written policies and procedures relating to fraud.  These policies should clearly define roles and a set a tone that impacts an organization from the top down.

It is also advisable to periodically re-assess risk potential.  Setting a policy and putting a system in place is where it starts, but maintenance and occasional check-ups are just as helpful.  These periodic assessments involve identifying potential areas of risk, considering potential override controls and occasionally testing existing anti-fraud procedures.  These "fire drills" can provide any organization with much-needed assurance that these policies and procedures are working, and can also help to indicate what needs to be updated or changed.

The truth of the matter is that the 600% jump in online crime witnessed in 2009 should be a warning to all business organizations that the right precautions must be taken in order to avoid Corporate Account Takeovers.  Hyper-vigilance is never a bad thing and can wind up saving a company tremendous amounts of money in the end.

Richard P. Finkel, CPA, CFE, CIRA, CFF, is a Partner with BlumShapiro, one of the largest regional accounting, tax and business consulting firms in New England.  He is based out of West Hartford. Please contact Rich at rfinkel@blumshapiro.com or 860.561.6891.

 

Advisors | Auditors | Consultants | CPAs - Blum Shapiro is one of the premier public accounting firms in the northeast and a Top 100 CPA Firm in the U.S. Our professionals serve businesses, individuals and organizations in Boston (MA), Hartford (CT), Cranston (RI), Shelton (CT) ,Quincy (MA) and Newton (MA) with audit, tax and business consulting services. Our firm has developed practice areas in automotive, construction, education, government, healthcare, hospitality, manufacturing, nonprofit organizations and professional service firms. New Haven CT, Fairfield CT, Norwalk CT, Waterbury CT.