Fraudsters are using clever impersonation techniques to siphon millions from unprotected businesses
When Keith McMurtry, corporate controller of Scoular, a 124-year-old US grain-trading and storage company, was asked by his chief executive to wire $17.2m to an offshore bank account, he did not question it.
Chuck Elsea told Mr McMurtry in a top-secret email that Scoular was in talks to acquire a Chinese company. The chief executive instructed him to liaise with a lawyer at KPMG who would provide the wiring instructions to an account in China.
“We need the company to be funded properly and to show sufficient strength toward the Chinese. Keith, I will not forget your professionalism in this deal, and I will show you my appreciation very shortly,” Mr Elsea wrote in an email in June 2014. Over three transactions, Mr McMurtry transferred the $17.2m to an account in the name of Dadi Co at Shanghai Pudong Development Bank, according to an affidavit signed by an agent with the Federal Bureau of Investigation and filed in a Nebraska court.
The email was a fraud. Criminals impersonated Mr Elsea by creating a phoney email account in his name. They also set up fake email and phone numbers in the name of a real KPMG partner, who later said he had never heard of Scoular. US authorities have traced the emails and phone number to Germany, France, Israel and Russia.
Scoular, which is ranked 66th on Forbes’ list of the US’s largest private companies with revenues of $5.9bn, is one of several thousand companies that have fallen victim to a new type of fraud known as business email compromise schemes which have netted $800m in the past six months.
In January 2015, Xoom, an international money transfer company bought for $890m last July by PayPal, a pioneer in digital payments, said an employee in its finance department was duped into transferring $30.8m in corporate cash to an overseas account.
Ubiquiti Networks, a US manufacturer of wireless networking products, disclosed that its finance department was targeted last June by an imposter and transferred $46.7m to overseas accounts. After discovering the fraud the company began legal proceedings and has recovered $8.1m.
In the boss’s name
More than 12,000 businesses worldwide have been targeted by the scams, also known as CEO email schemes, between October 2013 and this month. The transactions have netted criminals $2bn, according to the Internet Crime Complaint Center, an intelligence and investigative group within the FBI that tracks computer crimes. Companies large and small, across 108 countries, have been hit and the threat is growing, law enforcement officials say.
“It has gotten quite out of hand,” says Mitchell Thompson, a supervisory special agent and head of the financial cyber crimes task force in the FBI’s New York office.
The criminals are “becoming more brash”, he says, by introducing third parties, such as law firms and consultants, to carry out the fraud. They have also become more sophisticated about how they troll potential victims.
“They’re using social media a lot against us. They might send a spam email intentionally to see that the executive is out of the office, [making] it prime time to target. They might look on Facebook and see that [the chief executive is] travelling to Europe or Australia so they know you’re in the air for a certain amount of time” and have a window to strike, Mr Thompson says.
Tricking people using the internet to steal money is hardly new. There have been criminal groups taking advantage of users of dating websites and fundraisers for disasters or terrorist attacks. A decade ago authorities were flooded with complaints of bogus Nigerian email scams and false lottery winners.
Criminals use a variety of tactics. Sometimes they gain access to executives’ emails by hacking into the accounts using phishing emails. The accounts of chief executives can also be spoofed by changing a letter or replacing a company’s official email service with a Gmail account. The phoney account created to mimic the KPMG lawyer used the suffix @kpmg-office.com, a fake address convincing enough to trick someone who is not checking carefully.
The criminals usually impersonate the executive and order the transfer, often through a second account they secretly control, such as the one said to belong to the KPMG lawyer. The money is sent to accounts in Asia or Africa, where it is harder for authorities to recover. By the time the company realises it has been duped, authorities say, the money has long gone.
Mr McMurtry told the FBI that he was not suspicious of the transfers since Scoular was discussing an expansion in China and he had been working on an annual audit with KPMG, according to the FBI affidavit. Mr McMurtry, who is no longer with Scoular, did not respond to requests for comment. Scoular also declined to speak.
The scam began simply enough. Mr McMurtry received an email purporting to be from Mr Elsea. “I have assigned you to manage file FT-809,” the bogus email said. “This is a strictly confidential operation, which takes priority over other tasks. Have you already been contacted by Rodney Lawrence [the KPMG lawyer]?” It went on: “This is very sensitive, so please only communicate with me through this email, in order for us not to infringe SEC regulations.”
The following day “Mr Elsea” sent another email stating that the transfer was urgent and he should “proceed asap with the wire to the same beneficiary and bank account as yesterday”.
FBI agents traced the phoney email account in Mr Elsea’s name to Germany. The KPMG email name was linked to a server in Moscow. The phone number provided was traced to a Skype account registered in Israel.
Scoular’s lawyers told the FBI that Wells Fargo said Dadi — the name on the account in Shanghai where Mr McMurtry sent the money — manufactured army boots. Dadi claimed to the bank that the wire transfers were part of a sales contract for the manufacture of boots, according to the FBI affidavit. Scoular said it did not purchase boots.
Mr Lawrence, the KPMG lawyer whose identity was used in the email scheme, is the global leader of KPMG’s international tax services. When interviewed by the FBI he told them he was not familiar with Scoular and had not spoken with anyone at the company, according to the affidavit.
The FBI obtained a court order to seize the funds held at Shanghai Pudong Development Bank but was told that the account had been closed and the funds transferred.
Business email compromise crimes are “a huge” problem, says Austin Berglas, head of cyber investigations at K2 Intelligence and a former chief of the FBI’s cyber branch in New York. Executives are so reliant on email they do not pick up the phone to confirm the transaction and “there is no second check,” he adds.
Some of the email scams are similar, suggesting they come from the same criminal organisation.
The FBI and US Justice Department have several investigations under way. Over the past 12 months the FBI has put more intelligence analysts on the case and have liaised with law enforcement agencies worldwide. “We will open cases this year and we will make arrests this year,” says James Barnacle, chief of the FBI’s money laundering unit.
Glen Wurm, director of accounting at AFGlobal Corp, which makes products for the aerospace, oil and gas industries, received an email in May 2014 similar to that sent to Scoular.
Purportedly from Gean Stalcup, the company’s chief executive, it said: “Glen, I have assigned you to manage file T521. This is a strictly confidential financial operation which takes priority over other tasks. Have you already been contacted by Steven Shapiro [attorney KPMG]?”
Mr Wurm was told not to speak to anyone and was directed to wire $480,000 to an account at the “Agriculture Bank of China”, according to legal documents. The hacker mimicked the tone Mr Stalcup used with Mr Wurm, according to a lawsuit that AFGlobal filed against its insurer Federal Insurance.
Six days later, Mr Shapiro contacted Mr Wurm confirming he had received the transfer, adding that he needed another $18m, according to a lawsuit. At this point Mr Wurm became suspicious and said he could not send so much money without alerting senior executives.
It was too late: the bank account had been emptied. AFGlobal is suing Federal Insurance and Chubb, its parent company, seeking more than $1m for allegedly breaching its contract by not covering the claim. Chubb has declined to comment.
Mr Thompson has declined to discuss either scheme but says criminal groups copy successful tactics. While some schemes have been as large as $90m, the average loss is $120,000.
“The ones you don’t hear about are the smaller corporations that send $50,000. They’re saying, ‘I’m not going to make payroll, we’re going to close our doors’ as a result of the fraud,” Mr Thompson says.
There is little that companies can do to recover the funds. Banks are not required by law to reimburse a company that makes a transfer. Cyber insurance policies might not cover a fraud against a company if its network has not been hacked.
“The bank will look at the totality of what the company has done to protect itself and whether or not they’re adhering to the agreement that the company has signed associated with the initiation of any of these wires,” says Doug Johnson, senior vice-president of overseas payments and cyber security at the American Bankers Association. One good practice is requiring the approval of two people, he says.
That practice is not fail-safe, however.
Like AFGlobal, Medidata Solutions, a clinical technology company, fell victim to email fraud in September 2014.
An employee in accounts received an email from an executive requesting a money transfer, according to a lawsuit filed in a federal New York court against Federal Insurance. The email included an image of the executive’s face and his signature.
Like the other alleged scams, the email included the name of a lawyer, who would act as a liaison for the employee. The employee told the lawyer that he needed the approval of two others before a $4.7m transfer could be made.
The fraudsters had a solution, though. Later that day, two employees with authority to sign off on the transfer were emailed instructions, purporting to be from the chief executive of Medidata, telling them to approve the wire to a bank account in China.
The transfer went through. Two days later, an email from the lawyer told the same employees to initiate a second transfer of $4.8m. One of the employees had grown nervous and called the executive direct — stopping the fraud and saving millions for the company.
Yet law enforcement officials say companies need to be more vigilant to guard against a crime that has become simpler to commit. “It’s easy,” says Mr Barnacle. “All you need is a computer.”