Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • BEC Scammers Struck Philadelphia Non-Profit Food Bank
  • Cyber Attacks
  • Data Breach

BEC Scammers Struck Philadelphia Non-Profit Food Bank

5 years ago David Bisson
BEC Scammers Struck Philadelphia Non-Profit Food Bank

Malicious actors used a Business Email Compromise (BEC) scam to prey upon a Philadelphia non-profit food bank.

According to The Philadelphia Inquirer, the scam occurred back in July when the hunger relief organization Philabundance was nearing the completion of its $12 million Philabundance Community Kitchen.

Nefarious individuals impersonated the construction company responsible for building the Philabundance Community Kitchen and asked that the food bank fulfill an invoice for $923,533.

Philabundance’s finance office paid the invoice on July 6. Several weeks later, the construction company asked where its money was. That’s when the non-profit organization realized it had fallen victim to scammers and deposited its money into an account under the control of fraudulent actors.

The Philadelphia Inquirer wrote that Philabundance had used reserve funds to complete the construction of its community kitchen. It also noted that the organization could recover some of its losses from having filed an insurance claim for the ruse.

The team at Philabundance confirmed the incident and wrote that the scam had not affected donors’ information:

This fraud was a one-time event and did not involve the day-to-day finances of our organization or any personal information of staff. Nor did it did affect our online donation system. Our donors can trust that their donations through that online platform have reached us and will continue to reach us, and will be used to feed the hundreds of thousands of people in our area who do not get enough to eat on a daily basis.

The food bank went on to state that it had invested in upgrades to its IT security systems and financial controls designed to defend against these types of attacks. Philabundance didn’t specify what these measures were. But according to The Philadelphia Inquirer, the non-profit organization had hired a security expert to recommend some of those new security measures as well as invested in frequent digital security training.

This scam highlights the willingness of BEC scammers to target anyone—even those that are trying to help others in need. In response, organizations need to make sure they’re taking steps to counter BEC scams. They can use these tips to get started.

The post ” BEC Scammers Struck Philadelphia Non-Profit Food Bank” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Encryption, Finance, Phishing, TripWire

Continue Reading

Previous How DMARC Can Stop Criminals Sending Fake Emails on Behalf of Your Domain
Next RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Why Agentic AI Is Security’s Next Blind Spot

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
  • RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
  • New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
  • Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help
  • Why Agentic AI Is Security’s Next Blind Spot

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT