RISMedia's ACE
Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type
{ "homeurl": "http://rismedia.com/", "resultstype": "vertical", "resultsposition": "hover", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "auto", "showauthor": 0, "showdate": 0, "showdescription": 1, "charcount": 3, "noresultstext": "No results!", "didyoumeantext": "Did you mean:", "defaultImage": "http://rismedia.com/wp-content/plugins/ajax-search-pro/img/default.jpg", "highlight": 0, "highlightwholewords": 1, "openToBlank": 0, "scrollToResults": 0, "resultareaclickable": 1, "autocomplete": { "enabled": 1, "googleOnly": 1, "lang": "en", "mobile": 1 }, "triggerontype": 1, "triggeronclick": 1, "triggeronreturn": 1, "triggerOnFacetChange": 1, "trigger": { "delay": 300, "autocomplete_delay": 310 }, "overridewpdefault": 0, "override_method": "post", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "redirect_url": "?s={phrase}", "settingsimagepos": "left", "settingsVisible": 0, "hresulthidedesc": "0", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iiGutter": 5, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "loaderLocation": "auto", "analytics": 0, "analyticsString": "", "show_more": { "url": "?s={phrase}", "action": "ajax" }, "mobile": { "trigger_on_type": 1, "trigger_on_click": 1, "hide_keyboard": 0 }, "compact": { "enabled": 1, "width": "200px", "closeOnMagnifier": 1, "closeOnDocument": 0, "position": "fixed", "overlay": 0 }, "animations": { "pc": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "fadeInDown" }, "mob": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "voidanim" } }, "autop": { "state": "disabled", "phrase": "", "count": 10 } }
Brand This Post With Your Info!

Most articles about real estate fraud have focused on the same scenario: hackers breaking into professionals’ email accounts to learn about upcoming transactions, then emailing the buyer to wire money to the hacker’s account. In reality, there are many other ways hackers insert themselves into communications, such as tricking the real estate professional into installing malicious software on their computer or phone, or changing escrow instructions (or other disbursements) at the office of the real estate professional via email. Hacking can also be done by less sophisticated methods, including phone, fax or inter-office memo. The latest evolution of the scam, however, is truly insidious.

1. A hacker obtains a REALTOR®’s transaction management/e-signature system login credentials by using a phishing email that looks like it’s from the transaction management system.

a. The user first types their credentials into the fake transaction management website, then are forwarded to the real one where their credentials work. They never even notice they’ve been phished. They just think they mistyped a password the first time.

2. The hacker logs into the transaction system to identify target transactions and collect information to fool participants.

3. If the agent uses the same credentials for both email and the transaction system, the hacker now has access to the agent’s email.

a. The hacker may set up an email-filtering rule so emails from the client “skip the inbox” and go right to the hacker.

b. Emails to clients can now be sent from the agent’s real email address. It’s not a spoofed email (which only looks like it’s from the agent’s account).

c. Changing their email password may help, but at this point, the hacker only needs to spoof future emails—and unless the agent notices the filtering rule, the hacker still has access to those email conversations.

4. Because the hacker has information about the mortgage and title company from the transaction system, they can spoof an email from those parties, too. When a client receives a (spoofed) email from multiple parties that confirm each other’s message, they’re more likely to trust each of those emails.

5. From that point, it’s a typical wire fraud scenario: At the appropriate time, the client is told to wire funds to an account the hacker has access to.

This is only one variation of many that Clareity has seen “in the wild.”

Clareity Consulting has written a paper that more thoroughly explains the wire fraud issue and provides concrete guidance on how to reduce the risk. It includes examples of steps taken by franchises, brokers, title companies and attorneys, as well as a draft company policy focusing on wire fraud. Download the paper by visiting clareity.com/reducing-the-risk-of-real-estate-wire-fraud.

Matt Cohen is chief technology officer at Clareity Consulting.

For more information, please visit www.clareity.com.

For the latest real estate news and trends, bookmark RISMedia.com.