Date of Alert: 8/31/2017 12:00:00 AM
SBA Response to Hurricane Harvey
During a disaster declaration, SBA coordinates with FEMA, State and Local partners to make sure we can deliver affordable disaster loan assistance to those affected, quickly and efficiently. We have a disaster assistance staff of nearly 1,000 employees, and we have activated additional surge staff in support of Hurricane Harvey recovery efforts. SBA stands ready to support the affected areas, and we’ll be there for the long‐term to help with recovery needs.
Date of Alert: 8/27/2015 12:00:00 AM
E-mail Account Compromise (EAC) is a sophisticated scam that targets the general public and professionals associated with, but not limited to, financial and lending institutions, real estate companies, and law firms. The EAC scam is very similar to the Business E-mail Compromise (BEC) scam, except that it targets individuals rather than businesses.
Date of Alert: 5/1/2015 12:00:00 AM
Macro-wielding attackers are increasingly using cloud services to evade existing defenses. Trend Micro, for example, reports this week that it's seen a recent flurry of spam emails that have Bartalex macro malware attached. The social-engineering attack tells recipients that their Automated Clearing House electronic-funds transfer was declined, and invites the recipient to click a link to "view the full details," which leads to a Dropbox page that lists specific instructions, including the need to enable Microsoft Office macros, says Trend Micro fraud analyst Christopher Talampas in a blog post. If users fall for the ruse, the macro runs and attempts to load the Dyre banking malware. Talampas says this particular Dyre variant "targets banks and financial institutions in the United States."
Date of Alert: 4/8/2015 12:00:00 AM
A public service announcement from the FBI's Internet Crime Complaint Center (IC3) can be accessed by clicking these links:
Date of Alert: 6/14/2016 12:00:00 AM
BEC is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victimâ€™s normal business practices.
The BEC scam continues to grow, evolve, and target businesses of all sizes. Since January 2015, there has been a 1,300% increase in identified exposed losses1. The scam has been reported by victims in all 50 states and in 100 countries. Reports indicate that fraudulent transfers have been sent to 79 countries with the majority going to Asian banks located within China and Hong Kong.