Alaska businesses targed with fraudlent direct deposit requests via email
A national email scam involving a fraudulent request to change the payroll direct deposit information of a current employee is now targeting Alaska businesses.
The email appears to be sent from the legitimate email account of a current employee, but in reality is a fraudulent request made by impersonating the employee’s email through use of either a spoofed personal or business email account. It may be possible to observe a minor difference in the email address, for instance, a different domain such as .org instead of .net. The email from the purported "employee" is sent to the business’s payroll or human resources personnel with a request to change the “employee’s” direct deposit for payroll purposes. A new bank account number and routing number, controlled by the fraudster, are included in the fraudulent email.
Click here for more information.
Targeted Payroll Scams
FBI warns of payroll diversion attacks where fraudsters steal bank login credentials and submit phony payrolls via direct deposit. It is a best practice to never give out or share your login credentials.
First National Bank Alaska protects accounts with access to direct deposit using multiple factors of authentication including physical tokens which help shield your accounts from these kinds of attacks. Never give out your token code to a caller, the bank does not validate your identity over the phone using the token and we will never call and ask you for your token code on an inbound call to you.
Click here for more information.
KRACK (Key Reinstallation Attack)
Security researchers have reportedly found a new vulnerability “KRACK” (Key Reinstallation Attack). KRACK impacts all wireless networks using the WPA2 industry standard encryption.
An attacker is able to crack the encryption in vulnerable devices, such as wireless routers, cellular devices, computers connected to the wireless network, and equipment which supports Wi-Fi. This allows the attacker(s) within range of a Wi-Fi enabled device to break the device’s encryption capability and allow them to acquire user credentials like credit card numbers, passwords, and other personal information).
Please ensure all personal devices such as those previously indicated have current firmware, updates and security patches released by manufactures and vendors. Learn more here.
Municipal Light & Power officials in Anchorage have warned consumers about callers pretending to be ML&P representatives and demanding payment for delinquent accounts. ML&P doesn’t contact customers about disconnection or paying bills at third-party locations.
Be mindful and vigilant.
Equifax Data Breach - Update
Equifax, a credit reporting agency, recently acknowledged the company experienced a security breach. It is possible data from 143 million consumers may have been compromised. This incident is exclusive to Equifax. First National’s systems were not impacted or compromised.
According to published reports, the information exposed includes names, Social Security numbers, birth dates, addresses and in some cases, driver's license numbers. Click here to check if your information may be part of the compromised data and always remain vigilant.
Steps to help protect yourself:
- Monitor your account activity daily with Online Banking and the mobile FNBApp
- Download the CardValet app and register your First National debit card to receive real-time push notification alerts for account activity. There is no charge to download from the Apple Store or Google Play. Mobile carrier rates may apply.
- Sign up for Credit Card Alerts to receive SMS text message and email alert notifications to ensure any unauthorized activity is quickly reported. Registration for credit card alerts is available to all credit cardholders for no cost, at FNBAlaska.com.
- Order a no-cost credit report once a year from each of the three major credit bureaus at annualcreditreport.com
Phishing scam uses bogus locked PDF
A phishing attack claiming to be a locked “Assessment Document” is circulating. The campaign sends an email with the subject: "Assessment Document" and a PDF attachment that claims to be locked.
The message reads: "PDF Secure File UNLOCK to Access File Content". If you click to unlock the document, a dialog box appears asking you to put in your email address and password.
If you receive an email like this, do not click on anything, and definitely do not enter your email address and password. Simply delete the message and empty your Deleted folder.