Look-alike Domain Spoofing Scam Takes Charity for $1 Million

Stu Sjouwerman | Feb 5, 2020

Happy volunteer family putting their hands together on a sunny day-1In yet another case of business email compromise, a charity is fooled through a combination of diligence, sophistication, and social engineering.

Back in August of 2019, Red Kit Community Housing, a U.K.-based charity, was victim of a BEC scam. According to a recently released notification about the scam, the cybercriminals did their diligence to identify external individuals at an entity that was providing services to the charity and, therefore, had their trust, spoofed a domain to represent the external entity, and used social engineering skills to make it seem like their communication was “a genuine follow up to an existing conversation.”

Whenever conversations over email involve money and the changing of banking details, there always needs to be a protocol to validate the request. To Red Kite’s credit, they do employ “a two-stage process to verify changes to payments and accounts which ordinarily would have caught this attempt.” But, in the case of this scam, the controls weren’t exercised in the way they should have.

According to Red Kite’s press release, “one key lesson is that no matter how good you believe your systems to be, the human dimension will always be a potential weakness.” This is why it’s imperative for organizations to realize just how much risk the user poses to the organization, and seek to eliminate that risk through continual Security Awareness Training. Through continual education, users can be taught be remain vigilant, especially in the face of any communications involving money and altering methods of payment.

The folks are Red Kite hope that through their sharing of this story, “…that colleagues in the sector reflect on their own systems and take the opportunity to ensure that this doesn’t happen to them.” Heed Red Kite’s warning.

Discover dangerous look-alike domains that could be used against you! 

Since look-alike domains are a dangerous vector for phishing attacks, it's top priority that you monitor for potentially harmful domains that can spoof your domain.

Our Domain Doppelgänger tool makes it easy for you to identify your potential "evil domain twins" and combines the search, discovery, reporting, risk indicators, and end-user assessment with training so you can take action now.

DomainDoppelgangerResults-1Here's how it's done:

  • Get detailed results of look-alike domains found similar to your primary email domain
  • You can now quiz your users with your look-alike results
  • Get a summary PDF that contains an overview of the look-alike domains and associated risk levels discovered during the analysis
  • It only takes a few minutes to discover your “evil domain twins”!

Find Your Look-Alike Domains!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/domain-doppelganger

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.