This Scam of the Week covers a new Direct Deposit phishing scam that is affecting employers nationwide without regard to their payroll portals or payroll service providers.
Here is the scenario:
- An employee receives from a company email account e-mail that mimics a familiar and trusted company service or resource, such as an e-signature request or a request to complete a survey.
- The e-mail asks the employee to click a link, access a website, or answer a few questions.
- Then it directs the employee to “confirm” his or her identity by providing his or her complete log-in credentials. Skeptical employees who question the request via reply e-mail receive a prompt response purporting to verify that the employee should complete the steps contained in the link.
- The bad guys then use the employee’s log-in credentials to access payroll portals, reroute direct deposits to other accounts, and wreak other havoc upon the employer’s network.
In some versions of the scam, hackers access employee e-mails to request a password change from the employer’s payroll service and then use the new log-in credentials to change direct deposit instructions.
The bad guys are doing substantial due diligence on the social engineering side of things, and these e-mails look real. In many circumstances, they are effectively spoofing the sender’s account, and employers are learning of the scam when employees begin reporting that they did not receive their direct deposits. By then, the damage has been done.
In addition to diverting funds, the scam creates a data breach for the employer and triggers notification obligations. Failure to take prompt action may result in penalties and liability to unsuspecting employers.
Employers may want to immediately take the following precautions to avoid security breaches as a result of these phishing scams:
- Alert your workforce to this scam.
- Direct employees to forward any suspicious requests to the information technology or human resources departments, rather than replying to the e-mail.
- Instruct employees to refrain from supplying log-in credentials or personally identifying information in response to any e-mail.
- Ensure that log-in credentials used for payroll purposes differ from those used for other purposes, such as employee surveys.
- Enforce (or, where necessary, establish) multifactor authentication requirements.
- Review and update the physical, technical and personnel-related measures taken to protect your sensitive information and data.”
Cyber-attacks are rapidly getting more sophisticated. GDR Group will help train your employees to better manage the urgent IT security problems of social engineering, spear-phishing and ransomware attacks. Take the first step now and email firstname.lastname@example.org to request a quote for security awareness training for your organization.