The Situation
In mid-2024, a mid-sized logistics company, "SwiftTrans," faced a crisis. Their accounts team received what appeared to be a routine email from their CEO, instructing an urgent wire transfer of $250,000 to a new supplier in Asia.
The email was convincing—it mirrored the CEO’s tone and even referenced a real shipment. The transfer was made. Days later, the CEO returned and confirmed he never sent the email. The funds were gone.
The Challenge: A Sophisticated BEC Attack
Business Email Compromise (BEC) is dangerously effective. The attackers had hacked the CEO’s email weeks earlier, silently monitoring communications. They waited for the perfect moment—when the CEO was traveling and hard to reach—to strike. The funds were routed through a complex web of international shell accounts designed to disappear quickly.
Our Four-Pronged Approach
1. Emergency Digital Forensics
Our team analyzed email headers and logs, confirming the breach originated from a phishing link. We identified the attacker's methods and shut down their access.
2. Rapid Financial Intervention
Within hours, we sent urgent fraud alerts and recall requests to the receiving banks via our compliance network, successfully mapping the funds' journey across Asia and Europe.
3. Law Enforcement Collaboration
We filed a formal IC3 complaint and liaised with Europol, ensuring the case received high-priority attention as part of a larger global investigation.
“I thought the money was gone forever. Probe Division’s fast response saved us from a disaster that could have crippled our business.”