WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 BEC Scammers Go After Employee Paychecks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

BEC Scammers Go After Employee Paychecks

Author: Charles Egli

Created: Thursday, January 17, 2019 - 19:03

Categories: Cybersecurity

An upward trend has been recorded with business email compromise (BEC) scams where fraudsters trick human resource departments into changing an employee’s direct deposit information to divert paychecks into an account they control. In a typical BEC scam, the fraudster sends an email to an employee authorized to make wire transfers and deceives them into sending the money into an unauthorized account. The underlying principle remains the same, only this time the victim could be anyone in the company. An email from an address that displays the name of the victim is sent to someone in the finance or the human resources department requesting to change the details for the existing direct deposit account; the crook also asks about the information necessary to complete the process. “From this point, the threat actor will be thinking on their feet to a certain extent; their main aim is to avoid being directed to any online third-party HR solution that would require access details they do not possess,” James Linton of Agari. He notes that requesting from the crook a voided check to verify the new account details does not deter their actions. They could play the social engineering card again, as described in the full article. Read the full article at Bleeping Computer.

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

May 19, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar