Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world. Fake invoice attacks are on the rise, let’s learn how to spot them and beat them.
Chances are you’ve already seen some of the less effective attempts. Like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on. They might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business. Even a co-worker, as cyber criminals are able to effectively ‘spoof’ real accounts and real people. It’s worrying that they know enough about your business to wear that disguise so well. A successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive:
The Payment Redirect
This style of fake invoice explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details. Or it includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice. Then they unwittingly send company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly.
The Malware Click – Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero. This makes the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed. Especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems. Often silently lurking until detected or activated.
How to Stay Safe
Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date. This will minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments. These could include:
- Verifying account changes with a phone call (to the number you have on record, not the one in the email).
- Double checking invoices against work orders
- Appointing a single administrator to restrict access to accounts
- Two-factor authorization for payments.
Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing. If anything looks off, even in the slightest, hold back on payment/clicking until it’s been reviewed. Fake invoice attacks may be increasing, but that doesn’t mean your business will become a statistic. Especially now that you know what’s going on and how you can stop them.