Skip to content

Sophisticated social engineering schemes targeting business bank accounts

October 24, 2025

We are seeing an increase in sophisticated social engineering attacks in which threat actors impersonate financial institutions and use accurate banking information to trick employees into disclosing credentials or authorizing fraudulent transfers. Recent incidents demonstrate that these schemes are becoming increasingly convincing and difficult to detect.

Overview of Recent Incidents

In one matter, a company received a call purporting to be from its bank, stating that unusual activity had been detected on the company’s account. The caller provided highly detailed and accurate information—including recent transactions and the date of the last login—making the call appear legitimate. During the call, the employee received a text message requesting login information, which they provided. The employee quickly became suspicious and alerted company leadership, who contacted the bank. The bank froze the account immediately, preventing any loss. A review revealed no evidence of unauthorized logins to the company’s email or bank account.

In a second, more elaborate incident involving a law firm, a retired partner and the firm’s business manager received similar fraudulent calls from individuals claiming to be with their bank. The callers knew detailed account information, including authorized signers and recent transactions. While on the call, the business manager’s inbox was flooded with hundreds of emails—apparently intended to distract from concurrent fraudulent activity. At the same time, two unauthorized individuals were added as custodians on the firm’s bank account, despite multifactor authentication controls.

Within minutes, 28 transfer attempts totaling approximately $2.2 million were initiated. The bank stopped 16; the remaining ACH transfers were flagged and are believed to be frozen. The bank also reported receiving an email authorizing one of the transactions that the business manager insists she did not send. As with the first incident, there was no evidence of unauthorized logins to the firm’s bank account or email environment.

Key Takeaways

  • Fraudsters are leveraging accurate account details to gain victims’ trust and legitimacy.
  • Attackers may spoof bank phone numbers and deploy simultaneous “distraction” tactics (e.g., flooding email inboxes).
  • Employees should be trained to terminate suspicious calls and contact the bank directly using a verified number.
  • Implementing strict internal verification procedures for fund transfers remains critical, even when the request appears to come from trusted sources.

How We Can Help

Our team regularly assists clients with incident response, fraud investigations, and proactive security training to help mitigate the risk of similar schemes. If you have questions about strengthening internal controls or responding to a potential incident, please contact any member of our Privacy, Cybersecurity, and Data Protection team.

This publication is intended for general informational purposes only and does not constitute legal advice or a solicitation to provide legal services. The information in this publication is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this information without seeking professional legal counsel. The views and opinions expressed herein represent those of the individual author only and are not necessarily the views of Clark Hill PLC. Although we attempt to ensure that postings on our website are complete, accurate, and up to date, we assume no responsibility for their completeness, accuracy, or timeliness.

Subscribe for the latest

Subscribe

Related

Event

2025 California Labor and Employment Law Symposium

Join Clark Hill for a full-day symposium exploring the most pressing legal issues facing California employers today. Our California Labor & Employment attorneys, along with colleagues from our Immigration and Cybersecurity/Data Privacy groups, will provide practical insights, legal updates, and strategic guidance across a range of workplace topics. Whether your role is in-house counsel, HR leadership, or company executive, this event is designed to equip you with the tools to help navigate California’s ever-evolving employment landscape.

Explore more
Event

Webinar: End of Year Privacy Check-In: What’s Changed, What Hasn’t and What’s Happening in 2026

Attendees will gain insights specific insight into the definition of ADMT under the new rules, common in-scope use cases and requirements, risk assessment and cybersecurity audit obligations and expectations for regulatory focus in 2026. You’ll walk away with a “check-list” of compliance priorities for 2026.

The session will provide practical guidance for legal, compliance, and business teams preparing for compliance deadlines and navigating emerging privacy risks.

Explore more
Legal Updates

Section 232 tariffs expand to medium and heavy-duty vehicles, parts, and buses

On Oct. 17, President Donald J. Trump issued a proclamation under Section 232 of the Trade Expansion Act of 1962 imposing sweeping new tariffs on medium- and heavy-duty trucks, truck parts, and buses, marking the first time that the United States has applied Section 232 measures to an entire vehicle class outside the passenger car segment. The new tariffs, 25 percent on trucks and key truck parts and 10 percent on buses, will take effect on Nov. 1, and will apply according to the rules on tariff stacking.

Explore more