Security

Cyber-crime

Orion SA says scammers conned company out of $60 million

Incident sounds like a BEC fraud targeting an unwitting staffer


Luxembourg-based chemicals and manufacturing giant Orion SA is telling US regulators that it will lose out on around $60 million after it was targeted by a criminal wire fraud scheme.

The description of the incident taken from the company's Form 8-K filing with the US Securities and Exchange Commission (SEC) suggests that it may have been a business email compromise (BEC) scheme, although the term isn't used explicitly.

"On August 10, 2024, Orion SA determined that a Company employee, who is not a named executive officer, was the target of a criminal scheme that resulted in multiple fraudulently induced outbound wire transfers to accounts controlled by unknown third parties," the filing reads. 

"As a result of this incident, and if no further recoveries of transferred funds occur, the company expects to record a one-time pre-tax charge of approximately $60 million for the unrecovered fraudulent wire transfers."

The Form 8-K also explicitly noted that there was no break-in into its systems, nor has any of its data been compromised.

BEC scams make for a nasty business. The Feds themselves said earlier this year that they're even more lucrative than ransomware, incurring adjusted losses of $2.9 billion in 2023 alone.

It's a form of phishing that typically involves spoofing a trusted email address, such as a business' supplier with which the accounting department, for example, regularly authorizes sizable money transfers.

Usually, the email address is well-concealed – perhaps just a single character is amiss. The scammers often also carry out thorough research of both the target and their supplier, learning how and when they communicate to make the deception even more convincing.

For example, one Massachusetts trade union was targeted in such a way in January 2023. The scammers tricked one union staffer into sending millions of dollars to their bank accounts after spoofing a supplier and mentioning previously discussed transactions from genuine emails between the target and real supplier.

Orion obviously won't be happy about potentially losing the $60 million for good, but it's far from a threatening loss for a company that recently upgraded its 2024 outlook in its half-year results.

It beefed up the estimates for net sales by a pretty sizeable amount. It initially set the range to be between $1.46 billion and $1.54 billion – it's now forecast to be between $1.57 billion to $1.61 billion. Operating profit estimates also rose to a figure somewhere between $382.3 million $415 million, compared to between $305.8 million and $338.5 million in the prior period.

Orion said law enforcement was made aware of the incident and that it intends to pull every lever within reach to recover the lost funds, including potentially available insurance coverage. 

"To date, the Company has not found any evidence of additional fraudulent activity and currently does not believe the incident resulted in any unauthorized access to data or systems maintained by the Company," the filing went on to say. 

"However, the Company's investigation into the incident and its impacts on the Company, including its internal controls, remains ongoing. The business and operations were not affected."

The Register asked for more information. Orion told us: "Amid the ongoing investigation, we are not providing details beyond what is included in our 8-K filing." ®

Send us news
7 Comments

This uni thought it would be a good idea to do a phishing test with a fake Ebola scare

Needless to say, it backfired in a big way

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran named as source of Trump campaign phish, leaks

Political stirrer Roger Stone may have been a weak link after personal emails cracked

Google raps Iran's APT42 for raining down spear-phishing attacks

US politicians and Israeli officials among the top targets for the IRGC’s cyber unit

'LockBit of phishing' EvilProxy used in more than a million attacks every month

Leaves a trail of ransomware infections, data theft, business email compromise in its wake

Small CSS tweaks can help nasty emails slip through Outlook's anti-phishing net

A simple HTML change and the warning is gone!

Users call on Microsoft to update Outlook's friendly name feature

That one weird thing in Outlook that gives phishers and scammers an in to an inbox

Cybercrooks spell trouble with typosquatting domains amid CrowdStrike crisis

Latest trend follows various malware campaigns that began just hours after IT calamity

Singapore's banks to ditch texted one-time passwords

Accessibility be damned, preventing phishing is the priority

Microsoft tells yet more customers their emails have been stolen

Plus: US auto dealers still offline; Conti coders sanction; Rabbit R1 hardcoded API keys; and more

Google guru roasts useless phishing tests, calls for fire drill-style overhaul

Current approaches aren't working and demonize security teams

Cops cuff 22-year-old Brit suspected of being Scattered Spider leader

Spanish plod make arrest at airport before he jetted off to Italy