DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

United States Recovers $2.4 Million Obtained In Business Email Compromise

Posted on November 3, 2023 by Dissent

October 31, 2023

Orlando, Florida – United States Attorney Roger B. Handberg announces that the United States has civilly forfeited $2,462,000 in proceeds obtained from a wire fraud scheme that involved the takeover of a business email account. The forfeited funds are being returned to the fraud victim.

According to court documents, the victim, Company 1 (“C1”), sells comprehensive lead frame products and material solutions to the semiconductor packaging industry. In April 2022, C1 received an email requesting a change of payment information from someone it believed worked at its business partner, Company 2 (“C2”), a heavy equipment manufacturer from which C1 regularly purchases lead frame equipment. The email came from what appeared to be C2’s true email address. The email explained that C2 was unable to accept payment into its regular account due to a “fiscal year update,” and instead, asked C1 to make future payments to a different account. This email was a fraudulent communication intended to mislead C1 into unwittingly transferring funds to a criminal entity, rather than C2. As a result of the fraudulent communication, C1 wired $2,462,000 million to the account identified by the fraudster.

After realizing that C2 had not sent the email requesting the change, C1 reported the fraud to its bank, which ultimately caused the $2,462,000 million to be frozen. Agents from the United States Secret Service (USSS) then tracked down the sole signatory of the account that received the funds, S.T., who informed USSS agents that he has never done business with C1 or C2 and he did not believe he was the rightful owner of the funds. S.T. claimed that in approximately January 2022, he met a group of individuals at a Bitcoin conference and agreed to contract his services to the group. S.T. provided his banking information to this group in order to receive payment for the work he was going to perform. S.T. stated that he communicated with the group primarily though the WeChat messaging application, and that when he contacted them about the funds, they denied any fraud-related activity. Because C1 and its bank acted quickly, law enforcement was able to seize and forfeit the full amount transferred by C1.

United States Attorney Handberg has requested and received permission from the Department of Justice’s Money Laundering and Asset Forfeiture Section (MLARS) to remit the forfeited funds back to the victim. MLARS administers the Department’s Asset Forfeiture Program victim compensation process to ensure forfeited funds are returned to victims. U.S. Attorney Handberg noted that “civil forfeiture is an important tool frequently used by federal law enforcement to benefit victims.” In fact, in fiscal year 2023, the Middle District of Florida obtained permission to use almost $44 million in forfeited funds to compensate crime victims. Since 2000, more than $11 billion in forfeited funds has been returned to victims through federal forfeiture. In many cases like this one, criminal forfeiture is not an option because law enforcement is not able to identify the perpetrator even after the criminal proceeds are recovered. U.S. Attorney Handberg thanks MLARS for its assistance in facilitating the distribution in this matter.

“This is another example of how fraudsters are getting more sophisticated with their schemes to steal money,” said Caroline O’Brien Buster, Special Agent in Charge with the Orlando Field Office. “With the cooperation of our partners in the business community, we were able to quickly freeze the funds and assist with returning them to the victim. The United States Secret Service will continue to investigate these and other types of financial fraud in our community and around the nation.”

Business Email Compromise (BEC) is a sophisticated fraud scheme targeting businesses that use wire transfers as a form of payment. The BEC scheme affects large global corporations, governments, and individuals, with current global daily losses estimated at approximately $8 million. Criminals compromise legitimate business email accounts through various hacking schemes, including social engineering and the use of malware. Once a business email account is compromised, a fraudulent email is sent directing the recipient of the email to unwittingly transfer funds to an illicit account. Alternatively, they create “spoofed” email domain names to trick people into thinking they know the sender. An email domain name is the part of an email address that comes after the “@” symbol. In email spoofing, one character in an email address is often changed or missing, thereby tricking the recipient. Criminals obtain and use privileged information to convince BEC email recipients that the transfer instructions are legitimate.

To avoid becoming the victim of a BEC scheme, verify email addresses are accurate when checking mail on a cellphone or other mobile device before you open any attachments or follow any instructions and never make any payment changes without verifying with the intended recipient by phone or in person. If you think you have been a victim of a BEC scheme, 1) immediately contact your bank to request a recall or reversal as well as a Hold Harmless Letter or Letter of Indemnity; and 2) file a detailed complaint with the Internet Crime Complaint Center at www.ic3.gov. The Internet Crime Complaint Center, is run by the FBI and serves as the country’s hub for reporting cybercrime. Visit www.ic3.gov for updated information regarding BEC trends as well as other cyber fraud schemes.

This case was investigated by the United States Secret Service. It was prosecuted by Assistant United States Attorney Jennifer M. Harrington.

Updated October 31, 2023
Source: U.S. Attorney’s Office, Middle District of Florida

Related:

  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Singapore Facing ‘Serious’ Cyberattack by Espionage Group With Alleged China Ties
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
Category: Business SectorOther

Post navigation

← HC3: Analyst Note: 8Base Ransomware
Update: Daixin leaks more data from Bluewater Health and other hospitals; databases yet to be leaked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • UK sanctions Russian cyber spies accused of facilitating murders
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.