Social engineering scams target employees' payroll credentials so attackers can access and change their bank account data.

Dark Reading Staff, Dark Reading

September 19, 2018

1 Min Read

The FBI's Internet Crime Complaint Center (IC3) reports a wave of social engineering attacks aiming to steal employees' login credentials so they can break into online payroll accounts.

Attackers send their targets phishing emails designed to capture login credentials, the IC3 states. They use these to access employees' payroll, change their bank account data, and add rules so the victim doesn't receive alerts regarding direct deposit changes. From that point, money is redirected to an account controlled by the attacker; usually a prepaid card.

IC3 advises companies to alert employees about the rise of this scheme and educate them on preventative and reactive measures. For example, they should know to hover their cursor over hyperlinks in emails so they can view the URL and ensure it's related to the company from which it claims to be. They should know to never provide login data or personally identifiable information in response to any email.

Payroll login data should differ from credentials used for other purposes, the report continues, and greater scrutiny should be applied to bank information provided by employees who request to update their direct deposit information.

Read more details and guidance here.

BHEURUOPE2018-vplug_Web_Banners_468x60_Sponsor.png

 

 

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights