Calgary Herald

THE PERILS OF CORPORATE EMAIL

How one company’s security provider unravelled a fraud operation over several months

- WILLIAM TURTON

NEW YORK The discovery of an alleged internatio­nal ring of fraudsters started with a one-line email. In April 2019, a company accountant received an email that appeared to be from the chief executive officer.

“Joanna, Can you mail out a check to to a Vendor today? Barbara,” the email said.

The email had some hallmarks of a scam that is becoming increasing­ly common. But it also had a few unique attributes that intrigued cybersecur­ity experts at the company’s email security provider, Agari Data Inc. Using a fake email account posing as the company accountant, Agari sent back a reply.

“Hi Barbara, Yes, of course. Please send me the details for the payment and I will take care of it ASAP. Joanna,” the reply said.

Over the next several months, Agari said it was able to unravel what’s known as a business email compromise operation. Agari dubbed the group sending the emails Exaggerate­d Lion, and said its members were based in Nigeria, Ghana and Kenya. Between April and August 2019, Exaggerate­d Lion targeted more than 3,000 people at nearly 2,100 companies, all of them in the U.S., according to an Agari report published Thursday.

Similar email attacks are a growing problem in the U.S., according to the latest Federal Bureau of Investigat­ion report, but one that doesn’t get the headlines of state-sponsored hacks or ransomware attacks. Global losses from business email compromise­s increased 100 per cent from May 2018 to July 2019, according to the FBI, which recorded 166,349 incidents from June 2016 to July 2019 and US$26.2 billion in losses during that period.

In one of its simplest forms, a business email compromise operator will send an email posing as the chief executive to an accounts payable department with an urgent request to transfer funds or fulfil a fake invoice. In another example, payroll representa­tives will receive an email appearing to be from an employee requesting to update their direct deposit informatio­n — often to a prepaid card account. Companies often realize something is amiss only when it’s too late to recover the transferre­d funds.

“We think of business email compromise as any attack which claims to be someone you know and trust and is attempting some kind of theft,” said Patrick Peterson, Agari’s founder and chief executive officer, in an online video. “This has been far too successful.”

Leveraging its position as an email security provider, Agari can sometimes see email scams that target its customers as they happen. In some cases, the company intervenes to communicat­e with the fraudster, posing as a clueless employee in order to draw out more details. That’s what happened with Exaggerate­d Lion, when the operation sent the email to the company, which Agari declined to name, last April.

In the months that followed, Agari said it engaged with Exaggerate­d Lion more than 200 times, and discovered the identity of 28 “mules” used to ferry payments between victims and the group itself. Mules are primarily recruited by Exaggerate­d Lion under the pretense of romance and likely unaware they are participat­ing in a criminal enterprise, the company said. “These romance-victims-turned-money-mules are told they are helping their romantic partner recover a large inheritanc­e that is tied up with lawyers and is being distribute­d slowly over time,” according to Agari.

In one exchange with a mule included in Agari’s report, a member of Exaggerate­d Lion wrote, “Okay honey please put the cash in big envelope and seal it before taking to Fedex.”

The unnamed mule responded, “Honey, that’s a lot of money to send cash that’s a heck of a liability it could be lost anywhere.”

Exaggerate­d Lion’s representa­tive then wrote, “It can’t honey. As long as you insure it. And I’ve received more than that through cash mailing when my dad was still alive.”

Agari declined to say how it obtained the digital conversati­ons.

As the fake relationsh­ip progresses, mules are asked to launder increasing­ly larger sums of money, according to Agari. Once an unsuspecti­ng business parts with its cash, through a paper cheque or wire transfer, Exaggerate­d Lion’s mules have a variety of ways to get the money back to them. Once a physical cheque is cashed, the money can be delivered to Exaggerate­d Lion via traditiona­l money transfer, Bitcoin, or gift cards, according to Agari.

Agari said it turned its informatio­n on the mules over to financial partners and law enforcemen­t.

Exaggerate­d Lion began operating in 2014 by running cheque scams on Craigslist and has since become more sophistica­ted, according to the report. One scam the group allegedly operated for years involved recruiting people to wrap their car with marketing decals for a beverage company in exchange for a fixed amount of money every week.

Participan­ts, who responded to an online ad or email, would be sent a fake cheque, which included the first month’s pay and money for a specialist to place advertisem­ents on the car. Respondent­s were then instructed to keep the first month’s pay and wire the money to the “specialist,” who was really a money mule or a member of Exaggerate­d Lion, according to Agari.

What makes Exaggerate­d Lion unique in the world of business email compromise is its preference for physical cheques, a payment method the group had “experience and comfort with,” according to Agari. Paper cheques may be helpful in evading systems designed to detect fraudulent wire transfers. Exaggerate­d Lion requests these cheques to be sent as fast as possible, through an overnight mail service, according to exchanges contained in the Agari report. But when a victim is hesitant about sending a cheque, Exaggerate­d Lion is quick to suggest a bank account to wire money to, according to the report.

Exaggerate­d Lion also used fake invoices, created using a free invoice generator, and W-9s, publicly available on the Internal Revenue Service website, “to inject a sense of authentici­ty in their attacks,” according to Agari. The group also used Google’s enterprise email service to send more emails, the security company said. “Google doesn’t start charging for G Suite until after the first month,” Agari said in its report. “This means Exaggerate­d Lion can create a new G Suite account, add compromise­d credit card informatio­n as a payment method, and effectivel­y have at least a 30-day free trial on each domain they set up.”

If the credit card doesn’t work, the group “can simply move on to another account,” Agari wrote. With a Google Enterprise account, Exaggerate­d Lion can send 2,000 emails a day, four times more than a regular Gmail account. Google declined to comment.

Among the mules identified by Agari was 63-year-old Reuben Alvarez Sr., of Beaumont, Texas, who was arrested in October 2019 and accused of laundering more than US$100,000, nearly US$70,000 of which came from the United Methodist Church, according to a probable cause affidavit from the Jefferson County Sheriff ’s Office. The rest came from small-to-medium-sized businesses, such as an insurance company in Ohio and golf courses in Alabama, who were all victims of a business email compromise scam, according to the affidavit. Agari said its researcher­s discovered 14 messages where Exaggerate­d Lion directed its targets to send money to Alvarez’s bank accounts.

Alvarez’s case is pending and he hasn’t yet entered a plea, according to the district attorney’s office. Neither Alvarez nor his attorney could be located for comment.

In an interview with a detective, Alvarez said the money he received came from a woman he believed to be named “Peggy Smith,” who lived in Washington State. Alvarez said he knew Smith from chatting online for three or four years but had never met her in person. Alvarez told the detective that he assumed the money came as part of Smith’s inheritanc­e payments after her parents died. But Alvarez said he knew his activities constitute­d a crime, according to the affidavit. When the detective drove Alvarez home, he handed over a package he had received the day before: It contained a US$25,647 cheque from a Tennessee health-care company.

Business email compromise (is) any attack ... attempting some kind of theft. This has been far too successful.

 ?? KRISZTIAN BOCSI/BLOOMBERG FILES ?? Email attacks are a growing problem in the U.S. Agari, an email security provider, found that firms often realize something is amiss when it’s too late.
KRISZTIAN BOCSI/BLOOMBERG FILES Email attacks are a growing problem in the U.S. Agari, an email security provider, found that firms often realize something is amiss when it’s too late.

Newspapers in English

Newspapers from Canada