Search

Frauds targeting businesses

This Cybersecurity Awareness Month, the CAFC is dedicated to helping protect your business and stay one step ahead of emerging frauds. From social media spoofing, business email compromise, payment redirection to ransomware, the threats are real and evolving. It's more important than ever to be aware, stay vigilant and protect your business against these growing risks.

Social media business account spoofs

Business social media accounts are increasingly being spoofed by fraudsters. With the cloned or imposter accounts, fraudsters can target existing contacts and followers' clients and employees with fraudulent messages and offers. For instance, they can send messages to existing contacts and followers (identified on the legitimate company's profile) and make claims that they have won a free giveaway or contest. In order to collect their winnings, potential victims are required to provide their credit card information.

Top tips to protect business

Spear phishing fraud and payment redirections

In these frauds, perpetrators take their time to collect information on their intended targets so they can send convincing emails from a seemingly trusted source. Fraudsters will infiltrate or spoof a business or individual's email account and create a rule to send copies of incoming emails to one of their own accounts. They will comb through the emails to: study the sender's use of language and to look for patterns linked to important contacts, payments, and dates.

Fraudsters launch their attack when the owner of the email account can't be easily contacted by email or by phone. It may look like a top executive sending an email to their accounts payable department requesting an urgent payment to close a private deal or it may look like an email from existing contractor providing new payment directions and requesting payment of an invoice.

Top tips to protect business

Ransomware

Most ransomware incidents start with an email phishing or spear phishing attack. The email will contain an attachment which can be an executable file, an archive or an image or a link. Once the attachment is opened or the link is clicked, the malware is then released onto the user's system. The malware can remain dormant for many days or months before files or systems are encrypted or locked. Other ways networks and devices can be affected are:

Top tips to protect business

Anyone who believes their business has been targeted or has fallen victim of cybercrime or fraud should report it to their police of jurisdiction and to the Canadian Anti-Fraud Centre's. Reporting can be done through the CAFC online reporting system or by phone at 1-888-495-8501. If you are not a victim, it is still important to report the incident to the CAFC as reporting can prevent further harm.

Date modified: