On September 18, the FBI released information about a new technique cybercriminals are using wherein they target employees through phishing emails designed to capture the employees’ login credentials. Once the cybercriminal has obtained an employee’s credentials, they’re reused to access the employee’s payroll account to change their bank account information. The cybercriminal adds rules to the employee’s account preventing the employee from receiving alerts regarding direct deposit changes. Direct deposits are then changed and redirected to an account controlled by the cybercriminal, which often is a prepaid card.
The FBI’s Internet Crime Complaint Center (IC3) said it received more than 300,000 complaints and losses of more than $1.4 billion due to this hack in 2016. There are nine things the FBI recommends:
- Alert and educate your workforce about this scheme, including preventive strategies and appropriate reactive measures should a breach occur.
- Instruct employees to hover their cursor over hyperlinks included in emails they receive to view the actual URL. Ensure the URL is actually related to or associated with the company it purports to be from prior to clicking.
- Instruct employees to refrain from supplying login credentials or personally identifying information in response to any email.
- Direct employees to forward suspicious requests for personal information to the IT or human resources department.
- Ensure login credentials used for payroll purposes differ from those used for other purposes, such as employee surveys.
- Apply heightened scrutiny to bank information initiated by employees seeking to update or change direct deposit credentials.
- Monitor employee logins that occur outside normal business hours.
- Restrict access to the internet on systems handling sensitive information or implement two-factor authentication for access to sensitive systems and information.
- Only allow required processes to run on systems handling sensitive information.