How to Avoid Love Letters From a Fraudster (and Social Engineering Scams)
All the bad actors you want to avoid â and how to do it.
Case Studies
Real-life examples of how organizations use PaymentWorks to improve compliance, reduce workload, and add value.Stuff to Watch
Library of short and sweet videos featuring product demos, customer interviews, and sessions with experts.Podcasts
The perfect way to geek out on all things vendor management, and get tips from our guests, partners, and customers.Vendor Management Appreciation Day
Dedicated to celebrating the unsung heroes of vendor management and up-leveling your strategy.Events
We go places. We do things. Join us!All the bad actors you want to avoid â and how to do it.
We recently sent out a series of emails in an attempt to imagine how fraudsters think. Specifically how they think about you. Sometimes, the best way to fight fraud is to put yourself in the fraudster’s shoes and think how they think.
That motivated our cheeky series, and we want to share that thinking more broadly. So in honor of the month of love, weâre highlighting the different types of vendor fraud your organization faces â as told straight from the horseâs mouth.
Aside from sweet nothings from bad actors, youâll get insights into how youâre at risk and what is at risk. And donât worry, we wonât leave you hanging. Weâll end on a high note by showing you how to strengthen and fraud-proof your process.
The Top Types of Fraudster Valentines and Social Engineering Scams
âTis Better to Have Loved and Lost⊠Automation
Get Ready For Vendor Management Appreciation Day 2024
Want Help Aligning Teams on Social Engineering Scams?
Interested in Tips On Social Engineering Scams?
Want Personalized Guidance on Social Engineering Scams?
The following will include a series of emails from a hypothetical fraudster who has made you his target. Warning: these may not sit well with you as they are genuine threats that face vendor managers everywhere.Â
After each letter, weâll recap the type of fraud risk and the implications for the organization.Â
Iâve been watching you.Â
I hope thatâs not too forward.
Itâs true, though. I was able to access your computer system and Iâve been watchingâŠ.waitingâŠ.
Iâve read your emails đŹ with your bosses and your friends in the wire room. Iâve noted when youâre planning on scheduling đ certain transactions.
And, donât tell anyone, but Iâm planning on manufacturing an email pretending đŠč to be a vendor waiting for a payment.Â
And itâs all thanks to you. I couldnât have done any of this without you.Â
I never believed in love at first sight, but this might be close. Your organizationâs reliance on manual vendor onboarding has given me the perfect in â and it may well end up as a million-dollar payday đ°.Â
So this is an ode to you!
Love,Â
Your Fraudster
Vendor impersonation fraud (aka spoofing aka vendor email compromise)
Vendor impersonation manipulates humans to get them to hand over confidential information or do things they know theyâre not supposed to do (like make exceptions to a documented process ::cough cough:: ).
The end goal for these conniving casanovas is to reroute legitimate payments to their bank accounts. Since fraudsters are either accessing or impersonating a real business email, itâs really tough to identify when itâs happening to you.Â
Plus, your hands are full. Youâre entire vendor onboarding and management process hinges on a ton of manual tasks. Youâre constantly fielding emails from vendors, so whoâs to say which are real requests and which are bad actors waiting for you to trip up?
Also disheartening: itâs not getting betters, as Chris Arehart from Chubb points out below:Â
Hello.
I just spoke with Fresh Cutz Paper Suppliers about their banking information. I need you to update the account number to 81928398729048 ASAP đ.Â
Please disregard the usual process for this change, and it needs to be done right away. Make the update by EOD, pay their invoice, and reply to this email to let me know both are complete.
We can worry about the details later. This is really important and could significantly impact our bottom line if itâs not done ASAP.Â
Can I count on you?
Regards,Â
Your CEO
P.S. Psssst! Don’t tell anyone, but it’s really me, your dearest fraudster. I know your organization has a culture of breaking vendor payment processes, even though it could cost you hundreds of thousands (or millions) of dollars đ”. You probably think pushing back on these ad hoc requests could cost your job, in fact, I’m counting on that type of thinking đ§ . I also know you’re so underwater with manual tasks that you probably won’t check the “from” address on this email and notice that it’s coming from yourceo@xyz.corp instead of yourceo@xyz.com. Chop chop. There’s lots to be done âł, so go ahead and push this request through before the CEO gets annoyed.Â
CEO fraud (aka phishing aka whale phishing aka CEO phishing fraud)
CEO fraud is especially nefarious because it takes advantage of employeesâ allegiance to the higher-ups. Itâs also a really, really effective way to edge into organizations that have a culture of breaking processes.Â
Do you have a boss whoâs always asking you to skirt the rules âjust this onceâ for the sake of speed and efficiency? Do you regularly (or at least more often than youâd like) get ad hoc requests that fall outside of the scope of your documented process?
Then youâre at risk.Â
Fraudsters can use that kind of culture to their advantage. They know that itâs âbad formâ to deny a request from the higher-ups. In fact, theyâre banking on it, quite literally. So when they send that email from your âCEO,â they know youâll do exactly what is asked of you and throw the process to the wayside. But in the aftermath, whose neck is on the line for falling for this scam?Â
Letâs see what your fraudster Valentine thinks:Â
Hi, itâs me again, your fraudster Valentine.Â
I just wanted to say how cool I think it is that your organizationâs culture embraces ad hoc, out-of-process requests from the higher-ups.Â
Like last week, when your CEO requested an existing vendor change. It was so lovely of you to update that banking info đ and pay that invoice, no questions asked.Â
It really shows me that youâre a team player. You know when to do as youâre told, even though it breaks protocol (which really helps me out when it comes to siphoning funds đ°đłïž illegally from your organization via vendor fraud).Â
I meant to send roses đčđč, but Iâm traveling right now. The Caribbean, to be specific đïž. Itâs beautiful here. And I wish you could be here with me, but I imagine youâll be busy with your job hunt soon, as soon as your CEO (and the actual vendor (!) ) finds out what happened (and how Iâm affording this dream getaway, hehe).Â
Â
Thinking of you fondly,
yourceo@xzy.corp
My dear,
I see you over there, typing đ» your little heart out. Itâs adorable how intently you focus on entering each vendorâs information. Your attention to detail đ is endearing, if not humanly imperfect.Â
Itâs so endearing that I hate to tell you this, but you mistyped â a number a few vendors back. You entered a â7â instead of an â8.â You also typed in a different vendorâs name, âUni Weeb Hosting,â instead of âUni Web Hosting.â Â
No worries. Your co-worker caught these pesky typos and is about to send you a note đ§ so you can make the changes. Looks like you have a lot on your plate today! LOL
This is good news for me. While youâre spending the next few hours making corrections and checking (and double â and triple checkingâ ) all the info youâve entered so far, Iâll be crafting a special email just for you.Â
Trust me, youâre going to love it.Â
See, Iâm going to send you an email from UniWebHosting.org (your web hosting vendorâs real email address is UniWebHosting.com) in a few minutes.Â
I’m guessing youâll be so underwater with data entry that youâll never catch the difference. And since nobodyâs the wiser about my neat CEO trick last week (yet!), youâll make this change request the same way you made that one. Youâre already doubting yourself đ€ anyway.
Youâre so efficient. Twice in two weeks!
Love,Â
Your Fraudster
More vendor impersonation fraud
These fraudsters will try every maneuver in the How to Fraud playbook. If CEO fraud worked for them before, they might try its pesky cousin, vendor impersonation fraud the next time around.Â
These fraudsters take advantage of weaknesses â things like manual-labor-heavy processes and tired eyes. They know that your vendor onboarding and management processes have holes they can exploit. They also know youâre understaffed and overworked and tired. Youâre prone to making mistakes â mistakes that will help them get away with fraud.Â
My dear,
This is the last letter youâll receive from me. Iâve enjoyed our courtship, but itâs time to move on. Â
In the next few days, youâre going to receive calls âïžÂ from the vendors I mentioned in my last few notes. Theyâre going to reach out about the status of their payments đ”.Â
You, my dear, will have the unfortunate job of confirming that those payments were made. And when you verify the banking info in that was input into the supplier portal for your ERP you will make a shocking đ discovery. Youâll sadly find that both payments were made to unverified bank accounts.Â
It will break your heart đ, and I just canât bear to see it.Â
Nor will I have to. Iâve decided to stay in the Caribbean đč for a while until I figure out my next target.Â
Just know that Iâve enjoyed our time together and appreciate all youâve done. Iâll never forget you, and I know youâll never forget me.
Yours forever,
Your Fraudster
Love âem and leave âem. This is all fraud and all social engineering scams. Once the bad actors have what they want, theyâre in the wind. Usually, itâs too late by the time the vendor desk realizes something is amiss.Â
The moneyâs already been sent. The true vendor has already (accidentally) been stiffed. And everybody is out a whole lotta cash.Â
Vendor onboarding and management processes that are overly reliant on manual tasks wreak havoc on the morale of vendor managers. These folks work tirelessly to keep the organizationâs vendor ducks in a row.Â
The thought that something like this could happen on their watchâŠwell, itâs stressful. It causes headaches, ulcers, and lost sleep. And that kind of psychological impact can drag down an entire organization.Â
These may not be the type of love letters you were hoping to receive for Valentineâs Day, but theyâre exactly the type in store for you without best practices in place to mitigate fraud.Â
Avoid the unnecessary heartbreak and consider how the following tips might help instead:Â
Document everything â Make it a part of the process to document the process, including procedures for vendor onboarding and change management, vendor verification, and vetting processes. We have a template for that here.Â
Note exceptions â Log all of the times the vendor desk is asked to break the process for onboarding suppliers and/or changing vendor information. You can use this template.Â
Build a compliance framework â If you notice a theme for writing things down, this one is unsurprising. Create a vendor compliance framework that outlines considerations for federal, state and local regulations. You guessed it, grab a template here.Â
Automate vendor onboarding â Automation can enhance and improve all of the best practices above. Automated vendor verification and vetting eliminate the possibility of human error. And as Debra Richardson points out, while your team is spending all your time on manual tasks, fraudsters get to spend 100% of their time figuring out how to trick you:Â
Automating onboarding makes things smoother for vendors and the vendor desk, allowing the entire organization to be more strategic. A strategic vendor management operation allows procurement and finance to align with overarching business goals. Automated processes also help guard sensitive information at every touchpoint.Â
Vendor onboarding and management is a critical function. It should make your heart skip a beat, but not because youâre living in fear of social engineering scams. The right combination of best practices and automation can ensure that your vendor relationships are as reliable and secure as a well-matched Valentine, leaving you confident to enjoy the sweeter aspects of your business partnerships.
Good news! The Vendor Management Appreciation Day (VMAD) celebration continues in 2024. Itâs our way of creating one giant love letter to our favorite people: vendor managers!
Why? Because we know itâs one of the most critical, under-recognized roles across industries.
VMAD is a brand-new holiday geared toward unifying vendor management professionals and celebrating innovation in the field.
Weâve released gifts each month to help you supercharge your vendor management efforts. Weâre also planning some awesome events so everyone can connect and celebrate the important, strategic role of vendor management.
Learn more here, and grab some free vendor management goodies.
Explore our blogs below. Theyâre filled with action items you can implement right away.
How to Prevent Social Engineering: 3 Common Scams Fraudsters Use to Trick Your Employees
Top Three Takeaways: Social Engineering Fraud and Your Vendor Master â Managing the Risk
Social Engineering Fraud Never Sleeps: 3 Ways to Prevent It
Vendor Verification: How NOT to Do it and What to Do Instead
Weâd love to walk through your process with you and talk about security, compliance, efficiency and sleeping better at night.
© Copyright 2024 - PaymentWorks