WASHINGTON, D.C.—It’s a chilling moment when a small business owner discovers hackers have stolen thousands of dollars from the company checking account.
Cybercriminals took an average $32,000 from small business accounts, according to a December survey of owners by the advocacy group National Small Business Association. And businesses don’t have the same legal protection from bank account fraud consumers have.
The Electronic Funds Transfer Act, passed in 1978, states that it’s intended to protect individual consumers from bank account theft, but makes no mention of businesses. Whether a business is protected depends on the agreement it signs with a bank, says Doug Johnson, a senior vice-president with the American Bankers Association, an industry group. If the business hasn’t complied with any security measures required by the agreement, it could be liable for the stolen money, he says.
Any business is vulnerable, but small companies are less likely to have security departments and procedures to guard against online theft than big corporations do. They also don’t have big revenue streams that are better able to absorb losses from a theft. And even if they get the money back, they still have to spend time and money dealing with the hassles of closing accounts and opening new ones.
Sandy Marsico, owner of Chicago-based marketing company Sandstorm Design, had her company accounts attacked twice. Her bank contacted her in December 2014, saying a transfer of more than US$50,000 to Mexico had been requested from her checking account. The thieves had obtained the account information; Marsico still doesn’t know how. The bank did an investigation but didn’t share its findings with her.
Marsico didn’t approve the transfer, the account was closed and a new one opened. But the following November, someone began withdrawing money from the new account in increments ranging from $1,000 to $4,000, totaling $20,000 in the course of a month. Marsico didn’t discover it until she got her monthly statement.
“My stomach dropped when I wasn’t able to identify these as our charges,” Marsico says.
The bank, which again did an investigation but didn’t tell Marsico the results, again reimbursed Sandstorm. Marsico has since moved some of her accounts to another bank.
How it happens
Cybercriminals are creative, changing methods as companies and banks find ways to prevent attacks.
Thieves are increasingly using realistic-looking emails to trick companies into transferring money from their accounts with what’s known as wire transfers, says Avivah Litan, a security analyst with the research company Gartner. Often, an employee receives an email purportedly from a company executive asking them to transfer the money from the company’s account into a specific external account. If employees don’t check to be sure the request is legitimate, they might go ahead and authorize a withdrawal.
The first attack on Marsico’s account was a wire transfer attempt but didn’t use an email to her company.
The FBI reported last August that more than 7,000 U.S. companies of all sizes had been victimized in emailed attacks since late 2013, with losses of more than $740 million. The government said the number of identified victims had surged 270 per cent between January and August of last year. Most of the thieves are believed to be in organized crime groups in Eastern Europe, the Middle East and Africa, the FBI said.
Criminals can also operate by planting malicious software known as malware on a company computer, often via an email that has a link or attachment. If the computer is used to log into a bank account, the malware can record the login and password and send it back to the criminals, who then withdraw funds. But many banks have procedures designed to protect against stolen logins. If bank computers don’t recognize a device trying to log in, the bank will send a one-time access code to the account holder on a separate device like a phone. Without that code, a fraudster can’t log in.
Using a computer or smartphone in a public place that has a Wi-Fi environment can also be risky, says Kevin Watson, CEO of Netsurion, a Houston-based company that provides cybersecurity for small businesses. Some Wi-Fi spots may have weak security, and savvy hackers know how to steal information that someone keys into their device.
And some thieves do it the old-fashioned way, simply by copying account numbers and routing information from checks and then printing false checks and depositing them. One thief made two withdrawals from the checking account at Mark Waring Ventures two months ago, one for $800 and another for $1,000.
“Someone can just look at a check and they’re a good part of the way to hacking into your account,” says Dave Waring, managing partner of the New York-based company that provides financial and other services to small businesses.
The bank reimbursed Waring, the account was closed and he now makes payments electronically.
At Neil Palache’s company, the culprit used a counterfeit debit card. Two thefts totalling $1,400 happened while Palache was online, looking at his account, and the card was immediately cancelled. The bank refunded his money and Palache got a new card.
“I was thinking, ‘they’re going to wipe me out of this keeps going,”’ says Palache, owner of The Wealth Creator Co. for Women, a Westlake Village, Calif., company that teaches women how to manage their money.
What can you do?
Business accounts are safer at banks that use what’s known as two-factor authentication, requiring unfamiliar account users or devices to supply additional information like one-time access codes, says Timothy Ryan, a managing director with the security company Kroll in New York. Sophisticated banks also have software that flags emails or attempted logins from unfamiliar Internet service providers, he says.
Additional steps owners can take:
“It’s a simple protection for a complex problem, but it takes discipline and that’s where people fall down,” says Watson, the Netsurion CEO.