SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Spearfishing attack costs
company $400K
THE CHALLENGES
When your boss — the CFO — is out of the office
and sends you an email to wire $100K to a bank
(not an uncommon occurrence in your range of
duties), you usually don’t second-guess the message’s
authenticity. If you did that for every request, you
wouldn’t get any work done. However, for our client,
a $450 million commercial construction company, this
message was a fraud — an example of “spearfishing.”
And the ruse worked.
The controller, who received the message, followed
the orders and initiated the wire transfer after getting
the required secondary approval from a co-worker,
who also didn’t suspect anything. No one thought
further about the matter and some days later another
request came in, this time for $300K to an offshore
bank. Only after this transaction was completed did
the controller suspect foul play.
This was the first occurrence of cybercrime that our client experienced and they weren’t
equipped to handle it. They had no incident response policy in place, and this event
uncovered their internal control deficiencies.
Case study
Sector
Commercial construction
Client challenge
Cybersecurity breach
Services provided
Investigation, cybersecurity
consultation
$100K
$300K
Case study: Spearfishing attack costs company $400K
“Grant Thornton” refers to Grant Thornton LLP, the U.S. member firm of Grant Thornton International Ltd (GTIL). GTIL and its member firms are not a
worldwide partnership. All member firms are individual legal entities separate from GTIL. Services are delivered by the member firms. GTIL does not
provide services to clients. GTIL and its member firms are not agents of, and do not obligate, one another and are not liable for one another’s acts or
omissions. Please visit grantthornton.com for details.
© 2015 Grant Thornton LLP  |  All rights reserved  |  U.S. member firm of Grant Thornton International Ltd
Connect with us
	grantthornton.com
	@grantthorntonus
	linkd.in/grantthorntonus
Skip Westfall
Managing Director, Forensic
and Valuation Services
Cybersecurity Services Co-Leader
T +1 832 476 5000
E skip.westfall@us.gt.com
Have a similar challenge?
Contact:
WHAT THE TEAM DID
Grant Thornton LLP was brought in to investigate
the incident and use its experience with forensic
technology, cybersecurity and incident response to
help the client through this difficult process.
First, the team investigated the crime to determine
(if possible) where the email originated, if it was
external and if internal people were involved. We
interviewed the controller and the secondary approver
and determined that the breach was externally driven,
most likely a social engineering ploy. The perpetrator
was familiar enough with names and titles of people at
the company to create an authentic-looking email.
Next, we examined the laptops and systems, since
the email contained a PDF attachment infected with
malware — probably ransomware, which holds
data hostage for money. After conducting a forensic
image of the client’s mail server and several laptops,
we detected that the malware wasn’t activated. We
performed email traffic analysis and determined that
no one else in the company received similar messages.
After getting the infected laptop cleaned and back
online, we conducted a security assessment and
provided recommendations on improving processes
and putting an incident response plan into place.
OUTCOMES
This was the first occurrence of cybercrime that
our client experienced and they weren’t equipped
to handle it. They had no incident response policy
in place, and this event uncovered their internal
control deficiencies. Their eyes were opened to how
unprepared they were.
Although their insurance made them whole fiscally,
the company was still exposed. The risk assessment
revealed their need for increased cybersecurity, among
other changes. The business leaders are now looking
to making improvements, such as:
•	 	Implementing detection software and making
overall technology enhancements
•	 	Conducting detection training; training employees
how to spot a fraudulent message
•	 	Tightening up internal controls
•	 	Creating an incident response plan and incident
response team
Content in this publication is not intended to answer specific questions or suggest suitability of action in a particular case. For additional information about the issues
discussed, consult a Grant Thornton LLP client service partner or another qualified professional.

Más contenido relacionado

Destacado

Destacado (15)

12 ways to enhance financial performance
12 ways to enhance financial performance12 ways to enhance financial performance
12 ways to enhance financial performance
 
Data Security: A field guide for franchisors
Data Security: A field guide for franchisorsData Security: A field guide for franchisors
Data Security: A field guide for franchisors
 
For effective governance, boards must set a stronger tone
For effective governance, boards must set a stronger toneFor effective governance, boards must set a stronger tone
For effective governance, boards must set a stronger tone
 
Corporate counsel & the burden of the regulatory environment
Corporate counsel & the burden of the regulatory environment Corporate counsel & the burden of the regulatory environment
Corporate counsel & the burden of the regulatory environment
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Strategic ways to pursue unrelated business income
Strategic ways to pursue unrelated business incomeStrategic ways to pursue unrelated business income
Strategic ways to pursue unrelated business income
 
Lessons in collaborating for public health
Lessons in collaborating for public healthLessons in collaborating for public health
Lessons in collaborating for public health
 
After the acquisition: 5 steps to manage the tax process
After the acquisition: 5 steps to manage the tax processAfter the acquisition: 5 steps to manage the tax process
After the acquisition: 5 steps to manage the tax process
 
Financial executive compensation survey 2015
Financial executive compensation survey 2015Financial executive compensation survey 2015
Financial executive compensation survey 2015
 
2016 SEC & FINRA exam priorities for asset managers
2016 SEC & FINRA exam priorities for asset managers2016 SEC & FINRA exam priorities for asset managers
2016 SEC & FINRA exam priorities for asset managers
 
3 success factors for transformational change
3 success factors for transformational change3 success factors for transformational change
3 success factors for transformational change
 
Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1
 
Benchmarking data: Innovation and growth in U.S. manufacturing
Benchmarking data: Innovation and growth in U.S. manufacturingBenchmarking data: Innovation and growth in U.S. manufacturing
Benchmarking data: Innovation and growth in U.S. manufacturing
 
CCAR and stress-testing segmentation insights
CCAR and stress-testing segmentation insightsCCAR and stress-testing segmentation insights
CCAR and stress-testing segmentation insights
 
SALT energy savings
SALT energy savingsSALT energy savings
SALT energy savings
 

Similar a Case Study: How to cope with a spearfishing cyber attack

SSC Corporate Presentation
SSC Corporate PresentationSSC Corporate Presentation
SSC Corporate Presentation
Jim Craighead
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
PKF Francis Clark
 

Similar a Case Study: How to cope with a spearfishing cyber attack (20)

Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Cyber999 Brochure
Cyber999 BrochureCyber999 Brochure
Cyber999 Brochure
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a Budget
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
SSC Corporate Presentation
SSC Corporate PresentationSSC Corporate Presentation
SSC Corporate Presentation
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 

Más de Grant Thornton LLP

Más de Grant Thornton LLP (20)

GT Events and Programs Guide February/March 2019
GT Events and Programs Guide February/March 2019GT Events and Programs Guide February/March 2019
GT Events and Programs Guide February/March 2019
 
GT Events and Programs Guide December/January 2019
GT Events and Programs Guide December/January 2019GT Events and Programs Guide December/January 2019
GT Events and Programs Guide December/January 2019
 
GT Events and Programs Guide
GT Events and Programs GuideGT Events and Programs Guide
GT Events and Programs Guide
 
GT Events & Program Guide: ForwardThinking October/November 2017
GT Events & Program Guide: ForwardThinking October/November 2017GT Events & Program Guide: ForwardThinking October/November 2017
GT Events & Program Guide: ForwardThinking October/November 2017
 
Real Estate Industry Success: Build, Transform and Protect Value into 2020
Real Estate Industry Success: Build, Transform and Protect Value into 2020Real Estate Industry Success: Build, Transform and Protect Value into 2020
Real Estate Industry Success: Build, Transform and Protect Value into 2020
 
Asset Management Industry Success: Build, Transform and Protect Value into 2020
Asset Management Industry Success: Build, Transform and Protect Value into 2020Asset Management Industry Success: Build, Transform and Protect Value into 2020
Asset Management Industry Success: Build, Transform and Protect Value into 2020
 
Technology Industry Success: Build, Transform and Protect Value into 2020
Technology Industry Success: Build, Transform and Protect Value into 2020Technology Industry Success: Build, Transform and Protect Value into 2020
Technology Industry Success: Build, Transform and Protect Value into 2020
 
Banking Industry Success: Build, Transform and Protect Value into 2020
Banking Industry Success: Build, Transform and Protect Value into 2020Banking Industry Success: Build, Transform and Protect Value into 2020
Banking Industry Success: Build, Transform and Protect Value into 2020
 
GT Events & Program Guide: ForwardThinking August/September 2017
GT Events & Program Guide: ForwardThinking August/September 2017GT Events & Program Guide: ForwardThinking August/September 2017
GT Events & Program Guide: ForwardThinking August/September 2017
 
Why prepare now? 5 things that smart businesses are doing TODAY to prepare fo...
Why prepare now? 5 things that smart businesses are doing TODAY to prepare fo...Why prepare now? 5 things that smart businesses are doing TODAY to prepare fo...
Why prepare now? 5 things that smart businesses are doing TODAY to prepare fo...
 
ForwardThinking June/July 2017 Grant Thornton
ForwardThinking June/July 2017 Grant ThorntonForwardThinking June/July 2017 Grant Thornton
ForwardThinking June/July 2017 Grant Thornton
 
10 social media tips for nonprofits to further engagement
10  social media tips for nonprofits to further engagement10  social media tips for nonprofits to further engagement
10 social media tips for nonprofits to further engagement
 
The Future of Growth and Industries Webcast Series: Trends to watch for 2020
The Future of Growth and Industries Webcast Series:  Trends to watch for 2020The Future of Growth and Industries Webcast Series:  Trends to watch for 2020
The Future of Growth and Industries Webcast Series: Trends to watch for 2020
 
ForwardThinking April/May 2017 Grant Thornton
ForwardThinking April/May 2017 Grant ThorntonForwardThinking April/May 2017 Grant Thornton
ForwardThinking April/May 2017 Grant Thornton
 
The Future of Industry: Sector Convergence & 2017 Outlook
The Future of Industry: Sector Convergence & 2017 OutlookThe Future of Industry: Sector Convergence & 2017 Outlook
The Future of Industry: Sector Convergence & 2017 Outlook
 
ForwardThinking Q1 2017
ForwardThinking Q1 2017ForwardThinking Q1 2017
ForwardThinking Q1 2017
 
DOL fiduciary rule: How it affects the insurance industry
DOL fiduciary rule: How it affects the insurance industry DOL fiduciary rule: How it affects the insurance industry
DOL fiduciary rule: How it affects the insurance industry
 
Tightening pressure transforms the landscape: The state of asset management
Tightening pressure transforms the landscape: The state of asset managementTightening pressure transforms the landscape: The state of asset management
Tightening pressure transforms the landscape: The state of asset management
 
Challenges facing a new administration
Challenges facing a new administration Challenges facing a new administration
Challenges facing a new administration
 
Impact of voter turnout in U.S. elections
Impact of voter turnout in U.S. electionsImpact of voter turnout in U.S. elections
Impact of voter turnout in U.S. elections
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 

Último (20)

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Case Study: How to cope with a spearfishing cyber attack

  • 1. Spearfishing attack costs company $400K THE CHALLENGES When your boss — the CFO — is out of the office and sends you an email to wire $100K to a bank (not an uncommon occurrence in your range of duties), you usually don’t second-guess the message’s authenticity. If you did that for every request, you wouldn’t get any work done. However, for our client, a $450 million commercial construction company, this message was a fraud — an example of “spearfishing.” And the ruse worked. The controller, who received the message, followed the orders and initiated the wire transfer after getting the required secondary approval from a co-worker, who also didn’t suspect anything. No one thought further about the matter and some days later another request came in, this time for $300K to an offshore bank. Only after this transaction was completed did the controller suspect foul play. This was the first occurrence of cybercrime that our client experienced and they weren’t equipped to handle it. They had no incident response policy in place, and this event uncovered their internal control deficiencies. Case study Sector Commercial construction Client challenge Cybersecurity breach Services provided Investigation, cybersecurity consultation $100K $300K
  • 2. Case study: Spearfishing attack costs company $400K “Grant Thornton” refers to Grant Thornton LLP, the U.S. member firm of Grant Thornton International Ltd (GTIL). GTIL and its member firms are not a worldwide partnership. All member firms are individual legal entities separate from GTIL. Services are delivered by the member firms. GTIL does not provide services to clients. GTIL and its member firms are not agents of, and do not obligate, one another and are not liable for one another’s acts or omissions. Please visit grantthornton.com for details. © 2015 Grant Thornton LLP  |  All rights reserved  |  U.S. member firm of Grant Thornton International Ltd Connect with us grantthornton.com @grantthorntonus linkd.in/grantthorntonus Skip Westfall Managing Director, Forensic and Valuation Services Cybersecurity Services Co-Leader T +1 832 476 5000 E skip.westfall@us.gt.com Have a similar challenge? Contact: WHAT THE TEAM DID Grant Thornton LLP was brought in to investigate the incident and use its experience with forensic technology, cybersecurity and incident response to help the client through this difficult process. First, the team investigated the crime to determine (if possible) where the email originated, if it was external and if internal people were involved. We interviewed the controller and the secondary approver and determined that the breach was externally driven, most likely a social engineering ploy. The perpetrator was familiar enough with names and titles of people at the company to create an authentic-looking email. Next, we examined the laptops and systems, since the email contained a PDF attachment infected with malware — probably ransomware, which holds data hostage for money. After conducting a forensic image of the client’s mail server and several laptops, we detected that the malware wasn’t activated. We performed email traffic analysis and determined that no one else in the company received similar messages. After getting the infected laptop cleaned and back online, we conducted a security assessment and provided recommendations on improving processes and putting an incident response plan into place. OUTCOMES This was the first occurrence of cybercrime that our client experienced and they weren’t equipped to handle it. They had no incident response policy in place, and this event uncovered their internal control deficiencies. Their eyes were opened to how unprepared they were. Although their insurance made them whole fiscally, the company was still exposed. The risk assessment revealed their need for increased cybersecurity, among other changes. The business leaders are now looking to making improvements, such as: • Implementing detection software and making overall technology enhancements • Conducting detection training; training employees how to spot a fraudulent message • Tightening up internal controls • Creating an incident response plan and incident response team Content in this publication is not intended to answer specific questions or suggest suitability of action in a particular case. For additional information about the issues discussed, consult a Grant Thornton LLP client service partner or another qualified professional.