| 1 minute read

Cybersecurity Awareness Brief: Wire Fraud via Email Interception & Manipulation

cybercrime locks and money

Cybercriminals are increasingly targeting organizations and individuals by intercepting legitimate email communications and altering wire transfer instructions. This sophisticated form of business email compromise (BEC) has led to billions in financial losses globally. The attackers exploit trust, timing, and lack of verification protocols to redirect funds into fraudulent accounts, often irreversibly.

How a BEC attack works:

  1. Email account compromise
    • Hackers gain access to a legitimate email account (e.g., a law firm, vendor, or executive) via phishing, credential stuffing, or malware.
    • Once inside, they monitor communications silently, waiting for financial transactions to be discussed.

  2. Email interception & manipulation
    • When wire instructions are sent or requested, attackers intercept the message.
    • They modify the account and routing numbers to point to a fraudulent account, often overseas and difficult to trace.

  3. Timing & social engineering
    • Attackers may impersonate the sender using lookalike domains or reply from the compromised account.
    • They often create urgency (“Funds must be sent today”) or confusion (“Use updated instructions”) to bypass scrutiny.

  4. Funds transfer & laundering
    • Once the wire is sent, funds are quickly moved through a network of mule accounts, making recovery nearly impossible.

Warning Signs to Watch For

  • Sudden changes in wire instructions, especially close to payment deadlines
  • Emails with subtle domain misspellings (e.g., @teamavalon.com vs. @t3amavalon.com)
  • Unusual tone or urgency from known contacts
  • Requests to bypass standard verification procedures
  • Lack of phone confirmation for high-value transfers

Best Practices for Prevention

Email security

  • Implement multifactor authentication (MFA)
  • Monitor for unauthorized access
  • Use domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and domain keys identified mail (DKIM)

Verification Protocols

  • Always confirm wire instructions via a trusted phone number

Training & Awareness

  • Educate staff on phishing, BEC, and social engineering tactics

Vendor Management

  • Establish secure communication channels and verification steps

Incident Response

  • Have a rapid escalation plan for suspected fraud attempts

If your organization handles wire transfers, especially in sectors like legal, real estate, or finance, you are a prime target. Review your wire transfer protocols today. Ensure that every change in payment instructions is verified independently – not just by replying to the same email thread.

Contact Avalon’s cybersecurity experts now for tailored guidance on securing financial workflows and mitigating insider and external threats.

Blog Articles

The Cost of Cyberattacks: Financial & Reputational Risks for Law Firms

When attorneys think about cyberattacks, they often focus on the immediate crisis – encrypted files, compromised credentials, ransomware demands, or stolen client data. Yet the true impact of a law firm data breach extends far beyond the initial incident. Cybersecurity threats create a dual risk: 1) significant financial losses from downtime, recovery costs, regulatory exposure, and 2) potential malpractice claims, along with long-term reputational damage that can erode client trust, harm brand credibility, and affect future business development.

The Top 10 Cyber Gaps We See in Law Firms

Law firms and in-house legal departments possess some of the most sensitive and valuable data anywhere – from personally identifiable information (PII) and corporate deal terms to litigation strategies and privileged communications. This makes the legal sector a particularly attractive target for cybercriminals. Yet, across countless engagements, Avalon’s cyber experts continue to see recurring cybersecurity gaps in legal organizations of every size.

Employee Spotlight: Sarah Faherty

Every once in a while, we like to show off one of our hard-working, detail-oriented problem solvers. Take a moment to see who's in the spotlight today!