{"id":20813,"date":"2023-03-14T20:00:43","date_gmt":"2023-03-14T16:00:43","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/new-employee-scam\/20813\/"},"modified":"2023-03-14T20:00:43","modified_gmt":"2023-03-14T16:00:43","slug":"new-employee-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/new-employee-scam\/20813\/","title":{"rendered":"How too-eager-to-please new employees get scammed"},"content":{"rendered":"<p>The first few days in a new workplace are commonly packed with team meetings, trainings, onboarding sessions, and so on. Much ado with little understanding of what\u2019s going on. At the same time there are certain \u201crituals\u201d that many new hires go in for these days \u2014 one of which being posting on social media (most commonly, but not exclusively, on LinkedIn) about starting a new job. Often, companies themselves announce there how happy they are to welcome a new team member. And that\u2019s when the freshly minted employee attracts the attention of scammers.<\/p>\n<p>As a rule, such social-media posts give the names of both the employee and the company, as well as the job title. This is usually enough to identify the new person\u2019s manager (through the same social network or the corporate website). Knowing the names, you can either find or figure out their e-mail addresses. Firstly, there are lots of e-mail lookup tools to help with this. Secondly, many companies simply use the employee\u2019s first name, or first and last names, as their e-mail usernames, so all that\u2019s needed is to check which system is in use to be able to work out the address. And once they\u2019ve got your e-mail, then it\u2019s time for some <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/social-engineering\/\" target=\"_blank\" rel=\"noopener\">social engineering<\/a>.<\/p>\n<h2>Task one: transfer money to scammers<\/h2>\n<p>For the first few days in a new job the employee is likely not quite up to speed, yet keen to appear so in the eyes of colleagues and superiors. And this can lower the new employee\u2019s vigilance: they hastily carry out most any task without stopping to think where it came from, whether it sounds reasonable, or whether it\u2019s their business at all. Someone wants it done, so done it must be. This is especially true if the instruction came from their immediate supervisor or even <a href=\"https:\/\/www.waywedo.com\/blog\/scammers-use-linkedin\/\" target=\"_blank\" rel=\"nofollow noopener\">one of the company founders<\/a>.<\/p>\n<p>Scammers exploit this to trick new employees. They send an e-mail supposedly from the boss or someone senior (but using a non-company address) asking the employee to do a task \u201cright away\u201d. The newbie, of course, is happy to oblige. The task might be, say, to transfer funds to a contractor or purchase gift certificates of a certain value. And the message makes clear that \u201cspeed is of the essence\u201d and \u201cyou\u2019ll be paid back by the end of the day\u201d (of course!). Scammers highlight the urgency so as not to give the employee time to think or check with someone else.<\/p>\n<p>The boss has an air of authority, and the employee wants to be of use. So, they don\u2019t stop to query the rationale, or why they in particular have been chosen to perform the task. The victim transfers the money to the specified account without hesitation and reports back to the \u201cboss\u201d at the same e-mail address \u2014 again failing to spot that the domain name looks suspicious.<\/p>\n<p>The scammer continues to play the role of the big boss: they ask for documents confirming the transaction, and, after receiving them, praise the employee and say that they\u2019ll forward the documents to the initiator of the order (which adds a sense of legitimacy). To complete the feeling of a normal workplace interaction, the attackers also say they\u2019ll be in touch again if anything more is needed from the (hapless) employee.<\/p>\n<p>Only after some time does the employee either start to wonder why they were assigned the task, spot the non-company e-mail address, or mention the incident in conversation with the real boss. Then the sad truth dawns: it was a scam.<\/p>\n<h2>Aggravating circumstances<\/h2>\n<p>Like other <a href=\"https:\/\/www.kaspersky.com\/blog\/top-2023-job-scams-and-how-to-avoid-them\/46954\/\" target=\"_blank\" rel=\"noopener nofollow\">work-related scams<\/a>, this scheme has benefited from the mass shift to remote working. Even small companies have started hiring from around the world, meaning that some new employees may not only not know what their boss looks and sounds like \u2014 but have no way of quickly clarifying with a co-worker, even if they wanted to, whether the task looks to be on the level.<\/p>\n<p>What\u2019s more, if the supervisor and most of the other employees work in different countries, a request to transfer money to someone in your region could feel very plausible. Domestic bank transfers are always easier and faster than international ones, which lends a veil of normalcy to the scam request.<\/p>\n<p>Finally, smaller companies, which seem to be common targets, tend to have less formal money-handling procedures in place \u2014 without form-filling or financial controllers: just send it now, put it on your expenses, and you\u2019ll get it back in a bit. This is another factor that imparts legitimacy to scam e-mails.<\/p>\n<h2>How employees can avoid the trap<\/h2>\n<p>The most important thing for a new employee is not to lose their head trying to be of service to the company.<\/p>\n<ul>\n<li>It\u2019s important to look carefully at the addresses from which messages arrive by e-mail or in a messenger. If it looks unfamiliar, redouble your vigilance.<\/li>\n<li>Don\u2019t hesitate to ask a colleague whether such a request is normal practice. If something appears odd, better ask now than regret it later.<\/li>\n<li>If you get an unusual request seemingly from inside the company, clarify the details with the sender using a different communication channel. Been asked to buy gift certificates by the boss in an e-mail? Check with them in a messenger.<\/li>\n<\/ul>\n<h2>How companies can protect their employees<\/h2>\n<p>The most important thing an employer can do is correctly configure the company\u2019s mail server. It can be set up to flag e-mails from non-corporate addresses. For example, Google Workspace, popular with companies, labels such messages as \u201cExternal\u201d by default. And when you try to reply to such an e-mail, it clearly warns: \u201cBe careful about sharing sensitive information\u201d. Such notifications really help employees know whether they\u2019re talking to a company colleague or not. In addition, we recommend the following:<\/p>\n<ul>\n<li>To hold information-security training for employees on their very first day. The session should introduce the concept of phishing (just in case it\u2019s new), as well as give instructions on which practices are in use at the company and which definitely are not.<\/li>\n<li>To create an information-security guide for new employees with basic rules and precautions against major threats. See our <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">post for details<\/a> of what to include.<\/li>\n<li>To hold regular security awareness trainings for all employees; for example, using <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/adaptive-online-awareness-training?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">a specialized online platform<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaot\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are using social engineering to shake down newly onboarded employees.<\/p>\n","protected":false},"author":696,"featured_media":20814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917,1486],"tags":[80,1366,489,521,1923],"class_list":{"0":"post-20813","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"category-threats","10":"tag-fraud","11":"tag-security-awareness","12":"tag-social-engineering","13":"tag-threats","14":"tag-work"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/new-employee-scam\/20813\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/new-employee-scam\/25374\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/new-employee-scam\/27980\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/new-employee-scam\/25663\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/new-employee-scam\/26101\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/new-employee-scam\/28549\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/new-employee-scam\/34871\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/new-employee-scam\/47520\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/new-employee-scam\/20323\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/new-employee-scam\/20951\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/new-employee-scam\/25969\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/new-employee-scam\/31683\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/new-employee-scam\/31388\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20813"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20814"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}