Have Questions? Call or Text Your Cybersecurity Experts 7 Days a Week! (307) 999-7755

What to do about wire transfer fraud

Posted on November 1, 2019 by Benjamin Bressington

What to do about wire transfer fraud

What to do if you have been a victim of Wire Transfer Fraud?

Here are the 3 steps you need to take if you have been a victim of wire transfer fraud.

  1. Immediately call your bank and ask them to issue a recall notice from your wire.
  2. Report the crime to IC3.gov. The FBI monitors the complaints regularly.
  3. Call your regional FBI office and police and see if there’s anything they can do.

It's important to act fast! Don't let days or weeks pass before you report it!

Chances of recovery dramatically decrease after 1 business day. The said reality is if a fraud has occurred recovery can be a long process and dealing with insurance recovery can be time consuming. Review this video to understand that it can take up to 24 months for a recovery to happen if it is even possible.

Please note the ChatFortress team cannot help you if you have been a victim of fraud, our team can only help you prevent the fraud from occurring in the first place. We are sorry this has happened to you but next time you will use ChatFortress to protect yourself.

What to do if you have experienced a Wire Transfer Fraud or Business Email Compromise Scam?

What information will I need to file a compliant?

  • Victim's name, address, telephone, and email

    • This will be your information if you are the victim, or another person if you are filing on behalf of a third party
  • Financial transaction information (e.g., account information, transaction date and amount, who received the money)
  • Subject's name, address, telephone, email, website, and IP address

    • The subject is the person/entity allegedly committing the Internet crime
  • Specific details on how you were victimized
  • Email header(s) If you want to know how to extract this email header information you should review this post https://chatfortress.com/blog/emailheaderextraction
  • Any other relevant information you believe is necessary to support your complaint

The more information you can provide the better and faster IC3 and other related agencies can act on your behalf.

What type of information would possibly be considered evidence in regard to my complaint?

It is important that you keep any evidence you may have related to your complaint. Evidence may include, but is not limited to, the following:

  • Canceled checks
  • Credit card receipts
  • Money order receipts
  • Certified or other mail receipts
  • Wire receipts
  • Virtual currency receipts
  • Pre-paid card receipts
  • Envelopes (if you received items via FedEx, UPS, or U.S. Mail)
  • Facsimiles
  • Pamphlets or brochures
  • Phone bills
  • Printed or preferably electronic copies of emails (if printed, include full email header information)
  • Printed or preferably electronic copies of web pages
  • Hard drive images
  • PCAP files containing malicious network traffic
  • Network, host system, and/or security appliance logs
  • Copies of malware
  • Chat transcripts and/or telephony logs

Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence.

ChatFortress Eliminates Bank Transfer Wire Fraud!

Helping you verify the device and the person you're sharing wire information with via our secure chat platform. When you need to validate the person you are sending information you need ChatFortress communication.

Cybersecurity Resources

Talk to Us

Reduce your cybersecurity risk and exposure. Schedule time with your ChatFortress Specialist now
or Call 307-999-7755

Cybersecurity Education Links

Common Cybersecurity Mistakes and how you can protect yourself and your business from liability and financial loss! Instant Webinar Access!

Schedule Your Free Cybersecurity Risk Assessment Click Here to Schedule Call

Discover current hacker trends to steal your data and how you can protect yourself in 7 day FREE Email Cybersecurity crash course

Here are the 8 common types of email phishing attacks that hackers use to steal your identity. Are you protected?

Protect your business from hackersCrash Coursesmall business cybersecurity protectionHackerssmall business cybersecurity protection8typesofemailphishingscamssmall business cybersecurity protection