Monday, March 6, 2017

CYBERFRAUD AND THE CONVEYANCER

By Henry J. Dane

 
No one is immune to cyber-fraud, so why does everyone think it won’t happen to them?  Lawyers are still getting nailed every day with altered or fabricated wire instructions that they believe to be authentic.  This is definitely not “old news” yet.  Some of the frauds are very sophisticated and cleverly disguised to look genuine using names of parties, attorneys and brokers  involved in the transaction,  forging logos and similar looking email addresses and containing information (presumed to be confidential)  that vouches for their genuineness.

 
When asked why he robbed banks, the well-known stickup artist, Willie Sutton, said “Because that’s where the money is”. But today a   bank holdup will rarely net the kind of money that conveyancing attorneys handle every day, hundreds of thousands if not millions of dollars which can be stolen without a gun, a mask or a brown paper bag.   And yet, even smart attorneys are still sending out this kind of money every day based on information given, or more frequently, changed at the last minute  by a telephone call,  a scrap of paper or an email from an unverified source. 

 
Think about it this way, If you were a bank,  the person giving you the instructions would  need to have a unique user name and a  password  (8 characters,  upper and lower case, a number and a special character)  to pay your $49 phone bill.  Although it hasn’t been suggested that attorneys assign user names and passwords to clients, fellow attorneys,  brokers and mortgage lenders, it wouldn’t help much even if we did because  we cannot  limit incoming  communications to known and verified originators if we are going to effectively conduct our business or theirs.  And the problem for us is as much what goes out online as what comes in.

 
The banks aren’t doing that well either, and the crooks are doing to banks what has been working on lawyers.   If the front door is double bolted with a couple of steel bars and a combination lock, just walk around to the back of the building and climb in an open window. 

 
Take for example, the Berkshire Bank case brought in the US District Court in Boston (Jacobs v. Berkshire Bank,  USDC 3:16-dv-30190-MGM).   The following information comes from the Complaint which I have taken at face value.  The bank has 90 branches in 4 states and belongs to a holding company with total assets close to $8billion.  Not a mom and pop operation.  The Plaintiff, Mr. Jacobs, one of the bank’s customers periodically sent emails to his “personal banker” who he believed to be an employee of the bank, asking her to wire out funds from his account. These earlier transactions were remarkable only in that they were the set up for what was to follow. On October 17, 2016, while Mr. Jacobs was travelling in Europe,  an imposter impersonating him sent an email requesting that $580,000 be wired to a bank in Hong Kong. The wire was originated (either with no, or inadequate measures to verify the authenticity of the request).  The next day another email was received asking how much money remained in the account.  The “personal banker” responded that $1,590,000 remained in the account (but not for long).  There was an opportunity to salvage the situation when the original $580,000 wire bounced.   Not to be deterred, the “personal banker”  sent the wire again, this time successfully putting the funds in the hands of the imposter.  Then, on October 24, responding to a similar email, another $826,000 was sent to another bank in Hong Kong.  On his return, Mr. Jacobs found out about the unauthorized wires, asked the bank to restore the funds and the bank disavowed any liability.  (The Bank,  in its Answer filed on February 10,  alleges in part that the “personal banker” was “performing personal services for Mr. Jacobs and his business, including but not limited to serving as his personal bookkeeper and in conducting banking transactions for him, she was doing so as his employee, agent and authorized signer on the account.”)

 
Without any knowledge of this particular situation, but based on my experience with similar instances, the bank had much better security against electronic intrusion than Mr. Jacobs.  By means of one of the commonly used methods, the imposter could have gained access to Mr. Jacob’s computer or the password to Mr. Jacobs’ email account.  He would then be able to send a request to the “personal banker” that appeared to be genuine.  Probably, by the same means, the imposter was also able to determine Mr. Jacobs’ travel plans, so he would know when it would be difficult to verify the instructions by making a phone call to the account holder. 

 
 Because the bank had good security for online financial transactions and access to customer  financial information was protected  with user names, passwords and perhaps even two factor authentication,  the thieves decided to ignore the secure part of the system,  and to just ask for the money by sending an email to a vulnerable employee.  Such a request did not require a signature, a withdrawal slip, a picture ID, no last 4 of the social, no mother’s maiden name.  Just an email purporting to be from a customer saying  “here are some wire instructions,  please send the money.”

 
What happened to Berkshire Bank and Mr. Jacobs is very similar to  the fraud used to steal closing funds from attorneys.   According to my sources, this is how it works:

 
1.  The thieves identify properties for sale through one of many online listing services or brokers web sites;
2. They send the chosen  brokers an email containing a link that, when opened, either enables the thief to obtain the email or computer  password of broker  or  the imposter claims to be the system administrator asking the broker to change his or her password which the link then transmits to the thief.  Real estate brokers do not typically invest in good internet security, and many individual brokers have their own private email accounts with little or no security. 
3. Once the thief penetrates the broker,  all the information regarding the sale is potentially  available:  names and email addresses of parties,  closing date,  copies of offers and purchase agreements,  amount of proceeds etc. and most importantly,  the name and email address of the conveyancing attorney who is going to be distributing the seller proceeds.
4. Other participants including buyer and sellers are likewise vulnerable to infiltration because of weak security but it is more work to find them than it is to identify properties that are on the market from online listings. 
5.  Based on the information obtained,  the thief sends the closing attorney an email asking that the wire instructions formerly given be changed to a different account  (sometimes even in the same bank as the authentic instructions)  which will be cleared and closed by the thief as soon as the money is received. Using the information obtained from the infiltrated computers,  it is not difficult to make these emails look authentic.

 
If the conveyancing attorney has not avoided the dilemma by declaring in advance that wire instructions transmitted by email will not be honored, it is at this point in the transaction that the conveyancing attorney must intervene either to authenticate the instructions or to ignore the instructions and decide to send a check by overnight carrier   (in such a situation, it is unlikely that the conveyancing attorney would be bound by any contrary payment provisions of the P&S Agreement).
 
As in the Berkshire Bank case, the thieves gain access to the well secured resource through a poorly defended access point. Without going into great detail, many of the forged emails are extremely hard to identify, and you cannot rely on broken English  or  suspicious looking return addresses.  They may have genuine looking logos which are easy to cut and paste from the original documents, and I have even seen an otherwise genuine email from an attorney in which only the account name and number had been changed.

 
For these reasons, many attorneys now refuse to accept wire instructions delivered by email,  and are especially cautious about emails that purport to give new instructions shortly before or after the documents are recorded.   In any event, if such instructions are to be honored,  as a minimum they must be confirmed by a reliable source at a telephone number known to be valid  (not one contained in the email giving the instructions).    But keep in mind that if you are unable to reach the confirmation number, you need to hold the funds until satisfactory confirmation or reliable, alternative delivery instructions have been obtained.  In general, it should be presumed that last minute changes in wire instructions are per se fraudulent.

 
 It has been my recommendation that any Purchase and Sale Agreement that provides for the payment of  proceeds by wire transfer, include  language that specifies that “notwithstanding any agreement to the contrary,  the transmittal of  proceeds of the  sale by wire transfer  shall be subject to the  satisfaction in the discretion of the conveyancing attorney  that the instructions given are accurate and duly authorized,”  together with a “wet ink”  indemnity from the party giving the instructions.

 
In addition, I am seeing more and more attorneys adding to the footer of their email signature line a statement in bold type stating they will not honor wire instructions given or changed by email. 
 
 
Great care is justified, not just because of the potential financial loss to the attorney and his or her client, a loss which can only be recovered with good luck, but also because  the availability of insurance coverage for resulting losses remains unclear.  

 
Co-chair of REBA’s ethics section, Henry Dane has practiced law in Concord for 45 years with a broad-based practice including, real estate, zoning and land use,  permitting, civil litigation  and appeals,  municipal law,  medical employment law, medical ethics and research integrity,  non-profit and charitable corporations,  and commercial lending.  Henry can be contacted by email at hdane@danelaw.com.

No comments:

Post a Comment