How Wire Fraud Works

Over the past three years, US citizens have experienced a $1.6billion dollar loss in funds due to fraudulent transactions and email compromises. As hackers continually learn to bypass safeguards, this number grows at an alarming rate. Just this past year, businesses reported a 480% increase in wire fraud attempts. These “account compromises” have been reported across all 50 states and have occurred in 131 different countries.  Below are the different methods hackers are using to intercept your funds and what title offices can do to reduce risk.

Every Day Wire Fraud Methods

how wire fraud works.png

The most common method of hacking is to compromise the email accounts of various parties within a real-estate transaction. This usually works the following way:

  1. The realtor (most commonly hacked) has their email account compromised by a hacker.

  2. The hacker will monitor the realtor’s inbox until they receive wiring instructions then move it to a separate folder.

  3. The hacker will then change the wiring information to his/her bank account and send out for the funds to be wired.

In addition to this, the hacker can not only gain access to the account holder’s banking information, but now has a means of authenticating themselves as a user across multiple platforms. This is all done without the realtor or other parties ever realizing a hack has taken place. So, how does the hacker gain access to the email account?

Phishing

The most common way they gain access through what is called a phishing expedition where they create an authentic looking email from a financial institution familiar to the their hacking target in which they will ask for personal information (email login, financial information, personal identification information etc.). Once the target has entered personal information, or followed a link that caused them to unknowingly install malware on their computer, their account is compromised. 

Malware

Perhaps the most frightening instance is Malware because it often goes unseen once the device is infected. Malware can also stem from multiple sources including:

  • Emails

  • Fake websites

  • Text/SMS messages.

This makes it Malware nearly impossible to avoid. Once infected, Malware hackers can not only steal your personal information, but they can also hold (lock down) your computer for ransom.

Preventative Measures

At times it can seem like keeping your information safe in the digital world is a hopeless endeavor, but fear not! There are several steps and actions you can take to deflect hackers and keep your information secure. Here are some preventative measures that can be taken to better ensure the safety of your business and clients:

  1. Avoid historically vulnerable email servers (i.e Yahoo) and consider enhancing your authentication using a platform such as Gmail’s new Advanced Security

  2. Be wary of requests for secrecy or approval, such as verifying an undiscussed transaction

  3. Consider additional IT and financial security procedures. For example,  banning unencrypted devices on your network

  4. Do not use “reply” for business emails, instead use “forward” and re-enter the correct email

  5. Consider implementing multi-factor authentication

  6. Verify changes in vendor payment location using multi-factor authentication

  7. Confirm any requests for fund transfers

  8. Be familiar with your customer’s habits so you can spot anything out of the ordinary

We know that with the careful implementation of these tactics, you can reduce your risk of fraud.

FraudKrystine Monnett