IT Management, Policies & Certifications
Cyber & Data Security

Email Spoofing Scenario

This article was updated on:
Sep 20th, 2018

Email Spoofing Scenario

The accounts team receive an email from their MD (who is currently on holiday in sunny Spain), asking them to pay the attached invoice as a matter of urgency, but no need to reply as they are going on a boat trip all day and won’t have access.

The invoice wasn’t real and neither was the email from the MD, but the accounts team don’t know this and they’re being asked to ignore the usual policy of 30 day payment terms.

The payment is made and the company are now £2500 out of pocket.

That was a bit too easy wasn’t it?

This type of attack is unfortunately becoming an everyday occurrence and its too easy for cyber hackers to gather the information they need in order to carry out a very well-planned attack.

Proper staff training and regular awareness guidance are crucial, it’s of no benefit to your company’s security if you skim over the basics in a session and then its forgotten. Plans and procedures need to be put in place if anything suspicious or out of the ordinary ever happens, and the training should be continuous.

The hacker will have gained sufficient knowledge about the company before executing the attack and he chose this as the most likely method of getting money very quickly.

So how did he know so much about the company?

It’s all too common for organisations to list team members and company structure on their websites these days, plus also in many cases, providing email addresses as well. Realistically a name and job title is all they need and the rest is made up of calculated guess work, but if you’re providing them with all that information up front, unfortunately their attack is made even easier.

How did they know the MD was on holiday?

Social media – it’s all over his news feed and publicly accessible. When people hear the words ‘cyber security’ its often associated with the business world, but these safeguards also need to be adopted into personal lives outside of work as well. Attackers will use any means they can to get information about the person or company they are targeting and if you have 2 factor authentication on your emails, but the privacy settings on your social media aren’t locked down, you’re more vulnerable than you think.

What should have happened and could it have been prevented?

First and foremost, the company in question didn’t have the proper cyber security measures in place. They weren’t cyber essentials certified, so a lot of it was guess work and assumptions.

Staff members weren’t receiving regular cyber awareness training. In this particular case they should have been trained to spot a spoof email, even if it looks real and appears to be sent from a known email address.

The email request from the MD was very out of the ordinary and although this seems like an obvious trap to fall into, the attackers prey on the fact staff members are busy and sometimes not concentrating on what they are doing. Even if the request from the MD is questioned, they might skim over that email address that looks real and not spot the cleverly added ‘extra letter’ within the domain name, therefore not questioning whether it was actually sent from the known source or not.

If proper security procedures were put into place, the chances are that email would never have arrived in the first place, but they do still get through sometimes and it’s in these instances that we must be cyber aware and vigilant.

This is just one example of the tactics that are used by these criminals, not everybody falls for this scenario, but some do and its your ‘human firewall’ rather than any technical measure you have in place that will stop it.

There are far more complex and clever tactics if need be and therefore little point in having the best software security in place, if your staff are the weakest link in the chain.

Most attacks happen from the inside, sometimes on purpose, but majority of the time very innocently and unintentional. If you don’t have the proper internal safeguards then what you have on the outside becomes very vulnerable.

For more information on training your ‘Human Firewall’ or becoming Cyber Essentials certified, click here, or feel free to give us a call on 01323 287828.
Keen to learn more? Explore our other related resources below:
December 13, 2025
Password ‘Sextortion’ and Ransomware
Cyber & Data Security
August 1, 2025
Thinking About Buying Second-Hand Tech for Your Small Business? Read This First...
Telecoms & Connectivity
IT Management, Policies & Certifications
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
June 1, 2025
Microsoft 365 Apps: A Small Business Owner’s Toolkit!
Microsoft 365
IT Management, Policies & Certifications
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
March 1, 2025
Backup Essentials for Small Businesses: Have you explored the options?
IT Management, Policies & Certifications
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
November 12, 2024
7 IT Policies Your Small Business Needs
IT Management, Policies & Certifications
July 5, 2022
4 Tell-Tale Signs You Need an IT Support Partner
Microsoft 365
IT Management, Policies & Certifications
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
October 11, 2021
The Business Benefits of an IT Partner
IT Management, Policies & Certifications
July 28, 2021
Buyer's Guide: How To Choose An IT Partner
IT Management, Policies & Certifications
June 10, 2021
Microsoft Azure Migration: How Can it Benefit Your Business?
IT Management, Policies & Certifications
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
August 12, 2019
Identity Fraud - Easier Than Ever
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 20, 2019
How do I pick the Right Support Company for my Business?
IT Management, Policies & Certifications
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 3, 2018
Defining the Scope for Cyber Essentials
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 7, 2018
The difference between Disaster Recovery and Business Continuity
IT Management, Policies & Certifications
August 31, 2018
Office Move - IT Checklist
IT Management, Policies & Certifications
August 28, 2018
7 Signs you’ve outgrown your IT support partner
IT Management, Policies & Certifications
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 21, 2018
What types of IT Support are there?
IT Management, Policies & Certifications
August 20, 2018
What is GDPR?
Cyber & Data Security
August 20, 2018
Principles of GDPR compliance and the Rights of Data Subjects
IT Management, Policies & Certifications
August 16, 2018
How to Budget for Your IT as a Business Owner (Plus Free Template)
IT Management, Policies & Certifications
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Does my small business really need a server? 
IT Management, Policies & Certifications
Telecoms & Connectivity
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
December 2, 2017
Cyber Essentials Certification: Everything You Need to Know
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications
October 12, 0202
A Beginner’s Guide to Azure Active Directory
IT Management, Policies & Certifications