Not long ago, a company held a conference call with a key vendor that included a dozen executives. The call was to create a repayment structure and schedule for a $2.6 million debt. A $750,000 installment arrangement was agreed to for the following Monday and was then shared with the call participants in a group email.
That Friday, a request came through that same legitimate email chain, citing delays in the process and asking for the payment to be made directly to another vendor’s bank. The message contained the new banking information.
No one on