SUMMARY - Phishing and Social Engineering Threats
A chief financial officer receives an urgent email from the company's CEO requesting an immediate wire transfer to close a confidential acquisition. The email comes from an address nearly identical to the CEO's, uses language patterns matching previous communications, and references a real deal the CFO knew was in progress. She authorizes the transfer. Twenty million dollars disappears to accounts controlled by criminals who spent months studying the company, its executives, and its communications before striking.