FBI ALERT: Bad Guys Spoof Your Domain With CEO Fraud



stu_small

The FBI recently warned against a new cyber crime wave. It's called "CEO Fraud" where the bad guys impersonate your CEO using your own spoofed domain name, and order employees to transfer large amounts of money out of the country.

It happens to both small and medium organizations and the average damage per incident is 100,000 dollars. These cyber criminals monitor the email of the CEO for months, wait for the right time to pounce, and then send urgent emails that look like they come from the CEO ordering wire transfers.

Very often they can spoof your own domain name, if your email server is not configured correctly. To prevent this new type of CEO fraud, your email server should block incoming emails that look like they come from your own domain, but many email servers are misconfigured and allow these spoofed emails in.

KnowBe4 can help you find out if this is the case. There is no charge and it just takes one email from us to you. While we are on the phone, we will send a spoofed email "from you to you" and if it makes it through into your inbox, you know you have a problem that needs to be moved to the top of the list of urgent things to fix.

This is a simple, non-intrusive "pass/fail" test. No hacking required, it literally takes just one email sent by us, that is all. It's called the KnowBe4 Domain Spoof Test (DST), and you can sign up right now.

If you have not done this yet, I strongly recommend you do this immediately. If you don't do it, the bad guys will. Get your no-charge DST here:  

https://www.knowbe4.com/domain-spoof-test/-0

 

Topics: CEO Fraud

Subscribe To Our Blog


Recent Posts




Get the latest about social engineering

Subscribe to CyberheistNews