What to do when your employees are being impersonated

<  Back to Fact Sheets
What is Employee Impersonation?

Scammers can benefit from impersonating employees or managers of small businesses to trick legitimate employees into providing sensitive information, transferring money, and/or granting access to a business’s systems or network. It is essential for small businesses to be aware of how to detect impersonation scams to prevent any financial or reputational harm to their business.

Examples of Employee Impersonation

Impersonation of business owners, who often are easier to impersonate as they may have publicly available information on the company website or social media.

Impersonation of administrative assistants, who have authority to act on behalf of business owners.

Impersonation of human resource managers or business accountants, as these roles often are trusted to handle sensitive information about employees. Scammers may use the identity of these employees to trick other employees into divulging personal information,such as banking details, account information, contact details, schedules, tax file numbers.

Impersonation of general managers (or other employees in authority positions) may be used by scammers to engage new or entry-level employees to direct them to undertake certain tasks, such as purchasing gift cards with a promise of reimbursement.

Using an employee's identity to contact the business’s accountants and request to change the employees bank details to the scammers bank account to redirect payroll payments.

Impersonating employees to scam legitimate customers or third-party entities of the business through payment redirection scams, where scammers intercept a legitimate invoice being sent from a business and change the bank account details to their own before sending the email to the customer.

How does it occur?

The impersonation of employees is usually conducted using an employee’s emailaddress. It commonly occurs by either:

Compromising the employee's account, where scammers are able to monitor emails on the account and send emails from the legitimate address.

 Spoofing the employee’s email address, where the scammer has created a fraudulent email account with an address that looks similar to the legitimate one using a similar display or domain name (the text after the @ sign in the address such as @gmail.com). You can tell an impersonation email is from a spoofed address if there are any differences in the spelling of the address, it’s domain name, or the email provider used (e.g. Gmail, Hotmail, Outlook), when compared to the legitimate address.

Signs of Employee Impersonation

Employee impersonation attempts often share characteristic red flags, which can help equip employees to identify a deceptive communication. These shared characteristics include:

A sense of urgency: scammers will often put time pressure on the people they contact to minimise the possibility of them taking the time to verify the legitimacy of the communication.

Instruction to click a link: scam communications often emphasise the need to click on a link, as a means to gain sensitive information from the targeted victim.

Request for payment: scammers may request payment urgently, especially via physical gift cards oronline gift cards.

Inconsistent language: scammers impersonating employees may use language which is different from what would normally be expected of the employee.

How to Prevent Employee Impersonation

There are multiple steps a business can take to help mitigate the risk of employee impersonation.

Train employees on identifying impersonation attempts: Entry-level or new employees are particularly vulnerable to employee impersonation via electronic communication (such as emails or messages) as they may be less likely to be able to verify the legitimacy of a message or email. A common impersonation scam involves criminals impersonating business owners or managers to ask entry-level employees to purchase gift-cards, send money, or reveal company passwords. Businesses should ensure that all employees receive adequate training on how to identify suspicious communications.

Enforce strict protocols for financial and information change requests: Scammers will often use employee impersonation to request money, or to request personal information to be changed – for instance, requesting that legitimate bank account details are changed to their details. Businesses should establish a strict protocol for such requests, adding a second step of independent verification before fulfilling the request. For instance, an email from an employee requesting payment should be verbally verified by calling the employee (using the phone number of the employee that is stored in their file, and not any phone numbers contained in the initial email).

Consider privacy protection: Scammers can use information openly available online to appear more credible if they impersonate a business. Employees should be careful posting information online that identifies their workplace, position, work email address, and personal email address – this can make them easier to impersonate.

Enforce multi-factor authentication (MFA): The use of MFA across a business should be mandatory. MFA adds a second verification step for online account access, following a user entering their login details. MFA methods include one-time passcodes sent to a trusted mobile phone number or email address, or the use of an authenticator app. MFA adds an extra layer of security that can help prevent a business’s account being compromised.  

Educate clients: Remind customers that the business will only ask for payments to their legitimate bank account. Further, encourage customers to contact the business directly via the official contact number if they receive an invoice that contains different bank account details to any previous invoice. List the phone number on your business's official website and tell customers to not use links or contact details given in an invoice if it is suspicious.

How to Respond to Employee Impersonation

If someone has sent an email impersonating an employee, determine whether the email came from the employee’s legitimate email address. If it was sent from the legitimate address, it is most likely that the employee’s email account has been compromised. However, if the scammer is using a fraudulent email address which looks similar to the legitimate one, it is likely the result of email spoofing.

If an employee’s email has been compromised:

1. Act quickly to contain the email account:

Log-off all machines and reset the account’s password.

Check the affected accounts for:

o  Forwarding rules, and delete any you don’t recognise.

o  Rules involving RSS Feeds.

o  Changed account recovery settings, for example unknown phone numbers or email addresses you may not recognise. Cybercriminals can change recovery setting to allow them to regain access after the account password has been changed.

o  Unrecognised email folders.

o  Any unrecognised activity in the Sent and Deleted Items Folders, including in the Trash Can, to assess what actions the scammer has taken.

o  Any third-party apps or services that have access to your account. Remove any that are linked to your account that you don’t recognise.

Implement multi-factor authentication on all user accounts. Majority of BEC attacks start with an account compromise, and the best way to protect against account compromise is to activate multi-factor authentication.

Signout your account from of all other devices and check your login activity to see if your account has been accessed from unusual locations or at unusual times.

2. Check all Network-Accessed Devices (storage devices) recovery settings, change the password, and implement multi-factor authentication if you have these. 

3. Notify relevant contacts to minimise damage

Notify the relevant manager/s or team/s within your business who handle internal accounts receivable, accounts payable and payroll, and ensure all requests for hanges to invoices (payable and receivable) and payee account details are first verified with a follow-up phone call or in-person confirmation.

Contact your financial institution without delay and request the block or suspension ofany unauthorised payments. Your financial institution should then initiate an investigation and come back to you with information regarding the payment.

Notify other relevant contacts and third parties, such as customers, colleagues and suppliers, and advise them to be vigilant to any suspicious or fraudulent emails,such as those which refer to changing bank details, requests for payments, or unusual links or attachments. Confirm that any changes requested by your business must be further verified using an alternative channel of confirmation, such as calling your business’s number from its official website, and to not trust contact information or links in suspicious emails or invoices.

4. If the compromise has caused serious harm to your contacts

You may have further mandatory reporting requirements to your customers if they have experienced harm, as well as legal obligations to report a data breach.  

If the scammer has gained unauthorised access to customer or employee personal information as a result of the compromise, it is advised you seek advice to determine whether the event is deemed to be a notifiable data breach.

For Australian businesses, seek advice from the Office of the AustralianInformation Commissioner (OAIC). For further details on the OAIC’s Notifiable Data Breaches scheme or to seek legal support regarding mandatory reporting obligations, please visit the OAIC website.

If you intend to notify impacted individuals from the compromise and would like support from IDCARE, please complete an organisation support services form on our website.

Where invoices have been paid by contacts to a fraudulent account, seek advice from the bank from which the money was sent in relation to responsibility, liability or funds recovery. You may also choose to seek legal advice or engage legal aid in your State/Territory for general advice.

5. Report the matter to law enforcement.

When you submit your report, you will receive a reference number which you should keep on record. The information in your report will be sent to the appropriate police jurisdiction for assessment, however, note that not all reports are investigated.

For Australians go to www.cyber.gov.au - ReportCyber is an online cybercrime reporting system operated by the Australian Cyber Security Centre.

 

If an employee’s email has been spoofed (via using a similar display or domain name):

1. Complete the first step in the previous checklist titled ‘Act quickly to contain the email account’

2. Protect your Domain

Contact the registrar of the fraudulent domain name and request it is taken down

o  You can find out the registrar of the domain by performing a whois lookup for .au domains at whois.auda.org.au and for international domains at lookup.icann.org.

o  The lookup results may list a Registrar Abuse Contact Email to send takedown requests to. If there is no abuse contact email provided, perform an internet search to find the registrar’s website and look for an abuse form or contact email there. Once you have the registrar’s contact details, send a takedown request.

o  Include in your takedown request information about the fraudulent domain name and how it is similar to your own. You can do this by taking note of the Registrant, Registrant Name and Registrant ID (which is typically an Australian Business Number (ABN) or an Australian Company number (ACN) for domains ending in .au). This is helpful because often scammers will use your details for these fields when creating the domain to make it appear more legitimate.

Submit a complaint to the auDA for domains being used for impersonation.

o  The au. Domain Authority (auDA) is the official Australian authority and regulatory body for the .au domain name, such as ones ending in com.au, net.au, org.au.

o  You should submit a complaint to the auDA at auda.org.au if a scammer is using an Australian domain name which references your registered business name or is a misspelling of your domain name.

3. Contact the email provider of the fraudulent address

If the fraudulent email is using a common email provider (such as Outlook, Gmail, Hotmail) to impersonate the victim, you may be able to send an abuse report to the email service provider, where they may conduct an investigation or take action.

o For Gmail, submit an abuse report here.

o For Hotmail, Outlook, Live or MSN, report the email as an attachment to abuse@outlook.com

o For other email providers, access their official website for abuse reporting methods.

4. Report the matter to law enforcement. When you submit your report, you will receive a reference number which you should keep on record. The information in your report will be sent to the appropriate police jurisdiction for assessment, however, note that not all reports are investigated.

For Australians, go to www.cyber.gov.au - ReportCyber is an online cybercrime reporting system operated by the Australian Cyber Security Centre.

 

If you or a colleague has clicked on a link or downloaded an attachment sent from a fraudulent email impersonating an employee, your device may be infected with malware. Visit IDCARE’s Fact Sheet on Malware and Small Businesses.

print
Disclaimer

Identity Care Australia & New Zealand Ltd (IDCARE) provides identity and cyber security incident response services (the Services) in accordance with the following disclaimer of service:

  • IDCARE is Australia and New Zealand’s national identity and cyber incident community support service. IDCARE is a not-for-profit and registered Australian charity.
  • The Services provided do not constitute legal advice. IDCARE recommends that you consult your own legal counsel in relation to your legal rights and obligations, including but not limited to your legal rights or obligations under Australian and international privacy and data protection laws.
  • While every effort has been made to ensure the accuracy of the content provided, to the maximum extent permitted by law all conditions, terms, representations, and warranties (in each case, whether express or implied) in connection with the provision of the Services which might otherwise be binding upon IDCARE are excluded.
  • IDCARE’S liability for any loss or damage suffered by any person or organisation (including, without limitation, any direct, indirect or consequential loss or damage) arising out of or in connection with the Services (including without limited liability for any negligent act or omission, or statement, representation or misrepresentation of any officers, employees, agents, contractors or consultants of IDCARE) shall be limited to the fees paid by you to IDCARE in respect of the Services. For the avoidance of doubt, this limitation of liability extends to any liability arising from any actions performed or not performed as a result of any recommendations made in the course of providing the Services.
  • If you would like to provide feedback please use our Feedback Form.

CONTACT US

IDCARE is here to provide you with specialist support and guidance when faced with a cyber and identity related issue. Contact one of our Identity & Cyber Security Case Managers to learn more about our Support Services and how we can help you.   

Get help
ONLINE FORM

Submit a web request

Call Centre Icon

Call our AUSTRALIAn
NATIONAL CASE MANAGEMENT CENTRE

1800 595 160

Mon - Fri: 8am - 5pm AEST

QLD: 07 3555 5900
ACT & NSW: 02 8999 3356
VIC: 03 7018 2366
NT, SA & WA08 7078 7741

Call Centre Icon

call our NEW ZEALAND
NATIONAL CASE MANAGEMENT CENTRE

0800 121 068

Mon - Fri: 10am - 7pm NZST

AKL: 09 884 4440