skip to content

A Canadian city falls victim to $558K spear phishing scam

gavel icon

Introduction to the case

Fraudsters hack a not-for-profit to solicit funds from a municipal government

The municipal government of a Canadian city was scammed out of more than half a million dollars after a phishing email tricked a staff member into changing banking information to redirect funds into the fraudsters’ account. 

The fraudsters had hacked the email account of a not-for-profit organization (NPO) that received funding from the city. They also forged bank letters and used a fake domain name to mislead city staff. 

Luckily, this phishing scam has a happy ending.

hand holding money icon

Details of the fraud

The fraud attack, which took place in March and April 2022, is a clear example of spear phishing, where fraudsters send emails from a trusted sender they impersonate to trick targeted individuals into revealing confidential information or taking specific action.

person in magnifying glass icon

How did the fraudsters commit the crime?

The fraudsters used several tactics to make their outreach appear legitimate: 

  • They registered a fake domain that was very similar to the NPO’s official domain.
  • The email sent to the city’s funding coordinator copied two other high-ranking executives at the NPO. Both email addresses used the fake domain and looked very “official”.
  • The fraudulent email also included an attachment with a fake letterhead made to look like a letter from the NPO’s bank and signed by the head of treasury management services.

After sending several follow-up emails from (purportedly) the NPO’s executive director, the fraudsters convinced the city to change the banking information it had on file for the NPO and electronically wire half a million dollars to the fraudulent bank account. The city executed the transaction believing it was transferring funds to the NPO’s legitimate bank account.

legal icon

What was the outcome?

The city noticed irregularities in its payments to the NPO on April 11 and took immediate action. It notified the police about the fraud incident and directed its bank to cancel the transfer. The bank quickly placed a hold on the receiving account, but the transaction had already been completed. The city also launched an internal investigation and notified city council of the breach.

To recover the funds, the city filed a court claim naming several Canadian banks as defendants. An emergency motion led to a court order requiring the banks to trace the funds and put a temporary freeze on any accounts where the money was deposited. By April 22, the city had recovered more than 90% of the funds and subsequently recovered the entire amount.

To expedite the recovery process, the city hired outside legal counsel for support.

security alert icon

How could this have been prevented?

Luckily, this phishing incident ended favourably for the fraud victim, but not all fraud cases end with the funds being recovered. Public institutions and private businesses can learn helpful fraud prevention tips from this case: 

Man looking at laptop in an office, with large windows behind him
  1. Verify the legitimacy of emails or requests that ask for urgent actions, payments, or account changes.
  2. Avoid using your official work email account to sign up for third-party software, services, or applications that are not work-related.
  3. Always double-check website and email domains before responding or providing sensitive information. Fraudsters try to trick victims by using similar or looking like domains or emails.
  4. Never open attachments from unknown senders.
  5. Educate your employees to recognize and avoid phishing attempts.
    • Conduct regular training and tabletop exercises that simulate phishing attacks to ensure staff know how to respond appropriately.
    • Develop and enforce a process for addressing changes requested for vendor bank accounts and payment details.
    • Install email security software and monitor sensitive accounts on a regular basis to detect phishing attacks in their early stages.

How can BDO help

BDO can help the public and private sector detect, prevent, and mitigate email phishing scams and other types of fraud by providing attack simulation training and implementing cybersecurity controls to help identify and monitor any suspicious activities early on.

We offer digital forensics and end-to-end eDiscovery services covering all phases of fraud investigation. Our experienced teams can preserve and analyze email communications to reconstruct the timeline of attack, conduct a thorough probe to understand how the fraudsters gained access, and develop strategies to prevent email fraud in the future.

This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our privacy statement for more information on the cookies we use and how to delete or block them.

Accept and close