logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search

exc-5db2dbb0c428345ed4f4005d

Case Study: Commercial Proposal and invoicing scam

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ custom_padding=”5px|||||” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on” da_disable_devices=”off|off|off”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Recently, a friend told me of a very puzzling scam that caused a significant financial loss to a contractor he knew in the construction industry. The result was that a payment was made to an attacker in what seemed like a legitimate, and expected transaction. It wasn’t until the real supplier asked where the payment was that the contractor learned of a problem.

Getting an update to a pricing quotation, with new payment instructions

The scam seems to have happened as a result of a pricing negotiation that occurred via email between a general contractor and a roofing supplier. The contractor had sent specifications for a roofing job to the supplier, and received a quote by email, with instructions for payment to an account. This was all legitimate.

The next day, the contractor received another email, apparently from the roofing supplier, indicating that they were undergoing an audit, and the account he had been told to send the payment to had been frozen temporarily. So, new payment instructions were provided to the contractor, with new account information. The payment was made, and the contractor thought he had completed the transaction with the roofing supplier.

This second email with the updated pricing quotation and payment information was actually an attacker who somehow knew of the pending payment, and was able to intervene with new instructions that seemed plausible.

Phishing or not, social engineering by email is a big problem

While security experts may actually call this a “social engineering”, “pretexting” or “business email compromise” attack — carried out over email — the result is still serious damage to the victim’s business.

There are many variations on email pretexting attacks aimed at convincing a recipient that the email is from somebody they trust. Whether it is an emotional plea or an expected request for money, any business correspondence can leave an opportunity for deception by an attacker, and a financial loss for the victim. 

Security Tip: Any unexpected changes, especially involving exchange of money (even as part of an established chain of business correspondence) should be reviewed carefully, and confirmed with the other party.

Any business can benefit from having an ongoing “motivated learning” program for security awareness 

There are almost an unlimited number of ways that attackers can try to scam people who don’t think they are a target. The only way to avoid some of these deceptive practices is to have ongoing staff training.

Unfortunately, many awareness training programs are disliked by employees. And if they don’t believe the program is worthwhile, they won’t engage, especially in an ongoing manner. So, they won’t change their behavior enough to avoid being tricked by the next attack. This leaves the business vulnerable to significant losses, which could actually be avoided.

Click Armor uses “motivated learning” (or what some might call gamified learning – but really, it’s much more serious than “gaming”) to engage employees, and provide simulated risk scenarios that can help employees learn how to defend against all types of phishing or social engineering attacks. We use proven psychological motivators to engage employees to learn, practice and remember risk scenarios and how to handle them.

For more information about how the Click Armor motivated learning program works, please contact us.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column _builder_version=”4.4.6″ type=”4_4″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]

Share this article

[vc_empty_space height=”10px”]
[elfsight_social_share_buttons id=”1″]

Recent Posts

  • 0
    Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve
    June 16, 2025
  • 0
    Addressing AI opportunities and risks in your cyber security program
    March 13, 2025
  • 0
    What makes cyber security training boring
    March 3, 2025
  • 0
    A Canadian cybersecurity company’s lessons on training
    February 20, 2025
  • 0
    Cyber security training for executives: Why and how
    February 6, 2025
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use