Beware of fake invoices – businesses being targeted

Beware of fake invoices – businesses being targeted

Fraudsters are targeting businesses by hiding malware inside fake invoices which they send to steal online banking credentials, according to new information from the Financial Fraud Action UK (FFA UK) intelligence unit.

The FFA UK has warned that this activity has intensified in recent weeks and is urging businesses to remain vigilant.

Fraudsters email the invoices on text or spreadsheet documents to firms, whilst claiming to be a regular supplier or trusted organisation. However, opening triggers instructions which capture the company’s financial data.

The fraud operates because on opening the attachment, victims unwittingly enable a macro on their computer system. This macro in fact installs malware (malicious software) onto their computer.

The malware, which in some cases can also infect the business’ entire computer network, will then log the company’s online banking credentials and other financial information, before sending it back to the criminal. The data is then used to steal money from the business’ bank account.

A sinister change in approach

It is thought that fraudsters are changing their tactics as businesses are become increasingly aware of the threats posed by phishing emails.

In this new method, criminals often try to mimic the email address of a legitimate supplier, or go as far as to compromise their email address, in a bid to trick the recipient into thinking the invoice is genuine.

In some cases, fraudsters have even replicated the email address of someone working in the same company as their victim, tricking them into thinking the invoice has come from a colleague or manager.

Top tips to avoid becoming a victim of the scam:

  • Be on the lookout for unexpected invoices or unusual payment requests, especially those arriving in different file formats to normal.
  • Avoid enabling any macros on an untrusted document. (Macros in themselves are not dangerous and do serve a legitimate purpose – but they can be used to hide malware).
  • If you’re suspicious – don’t reply to the email but instead call your supplier on the number that you have on file to check the authenticity of the invoice.
  • Ensure you have the latest anti-virus and security updates installed on your computer and consider using high-level macro security settings in software applications.
  • Ensure strong firewalls are in place to help detect malware and prevent data leaving the network without permission. This can be achieved through investing in IT and seeking professional advice.
456 304 Rouse Partners

Rouse Partners

Award-winning chartered accountants offering tax, audit and advisory services. See more

All stories by : Rouse Partners

This information has been produced by Rouse Partners LLP for general interest. No responsibility for loss occasioned to any person acting or refraining from action as a result of this information is accepted by Rouse Partners LLP. In all cases appropriate advice should be sought before making a decision.

Let's stay connected

Sign up to our quarterly e-newsletters, with the latest tax and industry updates from our team.

Still undecided? See our most recent newsletter.

Privacy Preferences

This website uses cookies that help it function and to help us provide an improved user experience.

Necessary cookies: These enable core functionality such as security and accessibility. You may disable these by changing your browser settings, but this may affect how this website functions.

Performance cookies: Below you can change your privacy preferences for performance cookies which help us to review and improve our website experience.

 
We use cookies to help our website function and to improve your experience. Please confirm your preferences and/or agree to our use of cookies.