Payment fraud alert: Renewal notices that look legit but are actually phishing scams
Because your A/P staff is so good at keeping important bills paid, it unfortunately makes them a prime target for payment fraud email campaigns.
Official-looking notices can arrive in their inboxes warning that you’re about to lose customers because your company domain name or trademark is expiring. The email goes on to offer help, with a link to a payment page to supposedly take care of the renewal fee. But it turns out to be payment fraud.
Similar scams are out there that involve notices of software license or service subscription renewals.
Staying away from phishing payment fraud
Before A/P takes any action on these domain renewal notices, the sender needs to be checked out. The domain renewal sender’s address should match the domain registrar company represented in the email, and not be a third party. When in doubt, search the database at Whois.com/whois or check with IT.
Even if the email appears to be on the level, stay away from any links and instead go directly to your registrar’s verified website to pay the renewal fee.
Also to avoid payment fraud, double check the senders of any emails asking for payment for trademark monitoring services, registration with U.S. Customs and Border Protection or a private registry, or renewal of trademark registration.
Unless these emails are from your company attorney or the U.S. Patent and Trademark Office (look for an @uspto.gov sender address), you should assume they’re fraudulent.
In addition, be skeptical of messages warning that a third party is about to register your trademark as a domain in another country (a “.cn” address in Canada, for example) and offering you the opportunity to buy the domain first. This is also an attempt at payment fraud.
And before deleting these phishy emails, don’t forget to bring them to IT’s attention.
Be suspicious of emails containing a QR code
Because QR code usage has skyrocketed in recent years, cybercriminals have been busy blasting out batches of image-based junk emails with embedded QR codes. They’re often able to successfully bypass security protections.
According to the security firm Inky, the emails instruct employees to resolve a security issue, such as a missing two-factor authentication enrollment, or to change a password. Using the tried-and-true tactic of fear, the crooks warn about the “consequences” if the person doesn’t act.
Those who click on the QR code go to a site that looks real, but captures the user’s passwords and sends them to the hackers.
Recipients of these emails get lulled into a false sense of authenticity because the messages are from someone in the company. But that’s because the co-worker’s email account has been accessed through a business email compromise attack.
Free Training & Resources
White Papers
Provided by Personify Health
White Papers
Provided by UJET
Further Reading
Have you noticed your people are overstressed? There’s a good chance you haven’t. And that’s probably because, as a fi...
When a leader takes over an established team, whether you’re new to finance or well-seasoned in the industry, there is always a trans...
Increasingly clever cybercriminals are out to take your company’s money. They’d even stoop so low as hacking you with a purchase order ...
CFOs hate to hear about poor financial literacy among workers, especially the folks they count as friends. The latest economic news on that...
With an average turnover rate of 13.5% and retirements on the rise, there’s a good chance you’re a new boss in the finance worl...
Does it feel like the cost of nearly everything is on the rise or not coming down? Just when a commodity comes down in price, another one c...