Phishing Attack Targets Bank & Credit Union BSA Compliance Officers
As you may now know, a phishing scam targeting BSA compliance officers at credit unions and other financial institutions was reported this week by KrebsOnSecurity. The article originally singled out the attacks on credit unions but was later updated to reflect that attacks targeted bank BSA compliance officers as well. If you have not read the article, you should:
. The “Krebs” article contains an image of one of the phishing emails to a credit union.
What made these phishing attacks notable was that they were directed to the BSA officers of credit unions and banks by name. The phishing emails purported to be from named BSA officers at other financial institutions. The emails informed the recipient BSA officer that a suspicious transaction by one their customers had been put on hold by the “sending” institution and asked the recipient to open an attached PDF to review the frozen transaction. The body of the PDF contained a link to a malicious website.
Notice: FinCEN is aware of a fraudulent email purporting to be from a financial institution regarding the 314(b) Information Sharing Program. The recipients of the email are typically other financial institutions. The body of the email contains the following language: “We've got suspicions transfer from your client, and put it on hold. According section 314(b) of the USA PATRIOT Act we have to report you about potential money laundering. Please review the attached document with details of this case.” If you receive an email with this text purporting to be from another financial institution, please disregard it.
For the past several years, NASCUS has cautioned BSA officers and examiners that increasingly the nexus between BSA/AML and cybersecurity would become a focus of importance. This episode is illustrative of that fact.
As more information becomes available, we will provide it to our members. In the meantime, it would be prudent to remind staff of best practices in handling email to guard against phishing attacks (cyber hygiene). Best practices include:
- Hovering over the sender in the email to verify the sending address;
- Being alert for misspellings and grammatical errors;
- Verify sender before opening attachments and clicking on links; and
- Using the phone to verify the sender is legitimate.