ARTICLE
14 March 2016

"Are You at Your Desk?" The Simple Swindle that's Harming Companies During Tax Season

SK
Stoll Keenon Ogden PLLC

Contributor

In boardrooms and courtrooms, Stoll Keenon Ogden PLLC provides strategic legal counsel to clients in the Midwestern United States, across the country and around the world. Our attorneys are recognized among the best in their fields by Martindale-Hubbell, Best Lawyers in America and Benchmark Litigation. We build client relationships for the long haul, because succeeding at business is a marathon, not a sprint.
Stories of high-technology cyber-attacks on American banks, retailers, government and business are everywhere.
United States Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

Stories of high-technology cyber-attacks on American banks, retailers, government and business are everywhere. But a remarkably simple and low-tech scheme is proving to be highly effective against numerous businesses as we approach April 15th with federal tax returns on our minds.

It's a variation on the business email compromise wire transfer fraud schemes that plagued U.S. businesses in 2015. As the FBI reported last August, those schemes led to almost $800 million in fraud losses.

Desperately Seeking W-2 Data
The latest phish is directed at company human resources and payroll departments, and goes after W-2 data thieves can use to e-file fraudulent U.S. tax returns. We've seen it more than once. In hindsight, you'll wonder how it works at all. But every effective con game suspends your disbelief until it's too late. We'll explain why we think the W-2 phish is working for the bad guys.

When at work, we think we're vigilant, but we make mistakes. That human weakness persists even when companies are using technology to ward off electronic breaches. Criminals understand the vulnerability. It stems in part from our desire to work efficiently, contribute to a team effort, and be responsive when the boss (or the boss's boss) asks us to do or get something.

This evolving threat not only leverages that vulnerability, but also seems to take into account that typical "cyber awareness" guidance about business email risks has been focused on malware-laced attachments and hyperlinks. The latest scam has neither. Instead of getting into an employee's computer, it gets into their head.

"Are you at your desk?"
The subject line is simple. It's also disarming, especially when it comes from the C-Suite. It's intended to put the recipient on the defensive, and it implies a call to action. After all, anything but a quick response means "no, I wasn't at my desk." And that's why it's the powerful opening line for sophisticated criminals that mine business-oriented websites, publications and social media, looking for working relationships that can be counterfeited, then exploited.

"Please prepare a .pdf of the 2015 W-2s and send ASAP."
No one would fall for this, right? 

Wrong.

Most recently, security investigator Brian Krebs reported Seagate Technology (which generates nearly $12 billion in annual revenue) notified its employees that in early March it fell victim to the scheme and gave away information on thousands of current and former employees, when an employee sent the requested information to an imposter.

If it can happen to a publicly-traded icon of the technology industry, it might happen to your business. We've already seen it in Kentucky. And if it happens to you, you'll need an immediate response. After all, this type of data breach triggers a plethora of notification requirements under a kaleidoscope of state and sometimes federal regulations. Beyond that, you'll need a plan for contacting law enforcement and dealing with other legal concerns that follow a breach.  

Check Your Protection Plan
Whatever your business, if you handle personally identifiable information, payroll, credit cards or any other form of electronic payments, especially for consumers or employees, it is critical to review your cybersecurity and privacy policies, in light of your actual business practices. For many businesses, there may be regulatory obligations that attach to your data privacy and network security practices.

It's equally important that you understand your insurance, because losses arising from social engineering have sometimes triggered coverage disputes under general liability policies.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

ARTICLE
14 March 2016

"Are You at Your Desk?" The Simple Swindle that's Harming Companies During Tax Season

United States Privacy

Contributor

In boardrooms and courtrooms, Stoll Keenon Ogden PLLC provides strategic legal counsel to clients in the Midwestern United States, across the country and around the world. Our attorneys are recognized among the best in their fields by Martindale-Hubbell, Best Lawyers in America and Benchmark Litigation. We build client relationships for the long haul, because succeeding at business is a marathon, not a sprint.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More