The rising tide of business email compromise

Cybercrime is on the rise and is fast becoming one of the most noteworthy threats of the modern age. Perpetrators of cybercrime are located all over the world and can swiftly facilitate cybercrime between jurisdictions. Developing countries such as South Africa are also more vulnerable to cybercrime, especially with the rapid spread of technology and the internet across the African continent, creating a new and vulnerable target base for cyber criminals.

Although the intended reasons behind cybercrime may vary, the objective is primarily to cause financial harm, gain financial benefit, access data, or damage the reputation of a business. It should also be kept in mind that while large businesses and corporations are often targeted by cyber criminals, cybercrime is by no means aimed only at these larger businesses. Research indicates that small to medium sized businesses, across the world and also in South Africa, are increasingly being targeted by cybercriminals.

One such scheme that is becoming prevalent is Business Email Compromise (“BEC”). This involves some form of legitimate commercial transaction between two or more parties, where one party will generally receive an email, purporting to be from the other, requesting that a form of payment be made (which has become due in terms of the transaction) and stipulates banking details, detailing an account to which the funds should be transferred.

Where a deal is being discussed and the recipient is being asked to provide banking details via email, it is possible for the communication to be intercepted and a customer sent an email pretending to be the future recipient of the funds with altered banking details. The other party then pays the money into the altered bank account as confirmed in the last email, only to later discover that the actual intended recipient of the money never received it.

This type of criminal activity makes use of various cybercrimes, such as hacking or phishing to gain access to email accounts, followed by wire fraud. While any transaction could be the target of BEC, larger transactions such as the purchase and sale of property, motor vehicles and investments are a particular favourite for cybercriminals.

To prevent falling victim to the above schemes, there are certain measures which can be exercised to mitigate the risks of cybercrime such as exercising caution by utilising various methods of verifying banking details such as a simple phone call or using instant messaging applications such as WhatsApp. 

Making use of antivirus software can prevent malware from spreading on your devices and help scans for the presence of malware and malicious activity. Although, no antivirus is foolproof a current and up to date antivirus programme can reduce your risk.

Banks are often also willing to play a role to secure a commercial transaction and willing to contact the recipient’s bank to confirm banking details and so assist in the exercise of safe cyber security practices rather than trying to recoup wrongly paid funds after fraud has occurred.

With the continuing increase of cybercrime, members of the public must continue to exercise caution when making electronic payments. Confirm banking details and take steps to secure your device and system against attack. Employers should educate their staff and have the necessary protocols and procedures in place to assist in ensuring verification and payment controls are in place and strictly enforced. 

Disclaimer: This article is the personal opinion/view of the author(s) and is not necessarily that of the firm. The content is provided for information only and should not be seen as an exact or complete exposition of the law. Accordingly, no reliance should be placed on the content for any reason whatsoever and no action should be taken on the basis thereof unless its application and accuracy have been confirmed by a legal advisor. The firm and author(s) cannot be held liable for any prejudice or damage resulting from action taken on the basis of this content without further written confirmation by the author(s). 

July 23, 2024
Section 8C explained: Tax tips for employee share schemes

Section 8C explained: Tax tips for employee share schemes

Employee share schemes are often introduced to reward, retain, or align employees with long-term business growth. However, under section 8C of the Income Tax Act 58 of 1962 (the “Income Tax Act”), these arrangements can create significant and unexpected tax liabilities for employees when equity instruments vest. This article explains how section 8C operates, what qualifies as an “equity instrument,” and why careful structuring of share schemes is essential to avoid punitive tax outcomes.

The costly consequences of backdated share transactions

The costly consequences of backdated share transactions

The South African legislative framework regards backdated shares as a suspicious and illegal practice, as it arises when a share issue or transfer is recorded as having occurred on an earlier date than the actual transaction. While backdating may be viewed as an administrative oversight, the consequences may constitute compliance risk, serious misconduct on directors, beneficial owners and compliance officers who authorise the backdating of share transactions. This is because backdated shares may manipulate the timing of funds, obscure the source of funds, and distort a company’s beneficial ownership structure.

Tax transparency matters: Are your deals reportable?

Tax transparency matters: Are your deals reportable?

Some deals come with hidden reporting duties. Find out when your transactions could trigger SARS disclosure rules, and how to stay compliant. You may have heard the term “reportable arrangement” in tax conversations around commercial transactions. It sounds technical, and it is, but at its core, it’s about transparency. The South African Revenue Service (“SARS”) seeks information on certain transactions that could be used to avoid or reduce tax. If you enter a reportable arrangement, you may be legally required to report it. Failure to comply can result in significant penalties.

Sign up to our newsletter

Pin It on Pinterest