Pub. 4 Issue 4

16 Cyber Crimes: Why You Should Be Very Afraid Y ou want to balance your inventories. You have twenty more new vehicles than you need. Another dealer says he wants them. You do the deal, he picks up the vehicles, and you do not get paid. The dealer says he sent you a wire transfer for three- quarters of a million dollars, but you never received it. Your floorplan source is de- manding the vehicles be paid off. What went wrong? If you are like one of two Midwest dealers involved in a recent lawsuit, you may be the unfortunate victim of a cybercrime. In a Midwest lawsuit, a dealer arranged through its inventory manager to sell twenty Ford Explorers to another Ford dealer. After the arrange- ments were made through email, and the vehicles were shipped, the buying dealer received emails about payment from a slightly different email address that began with a simple message: “Due to some tax related procedures, we will prefer a wire transfer, let me know when you need wiring instructions?” Unfortunately, those payment emails were sent by a Nigerian fraudster who hacked into and took up residence in the selling dealer’s computer system. He provided wire instructions to his account, the money was wired by the buyer to the real bank account set up by the fraudster, and then the account was immediately emptied. Both dealers were victims. However, the federal judge considering the case had to choose a winner and a loser, and he ruled that the buying dealer must pay the selling dealer $735,225.40, meaning the buying dealer has lost nearly three- quarters of a million dollars. This case has important lessons for all dealers. Motor vehicle dealers engage in large dollar transactions, and they are targets of hacking. The FBI has reported that from 2013-2016, known losses for a cy- ber crime called Business E-mail Com- promise (BEC) totaled over $5 billion worldwide. The scam is carried out when a fraudster utilizes social engineering or hacking techniques to compromise business e-mail accounts and swindle unsuspecting employees into making fraudulent wire transfers. These crimi- nals appear to indiscriminately target companies—big or small—and use money mules to clean the account before anyone can discover what transpired. How does this scam work? The scam artist’s goal is to hack your e-mail account and either take control or use a spoof ac- count to deceive your vendors, sellers, or employees into wiring funds to an account controlled by the criminal. To access an e-mail account, the criminal can utilize numerous techniques. • Man in the Middle: in which the fraudster intercepts communica- tions, and steals credentials or

RkJQdWJsaXNoZXIy OTM0Njg2