The Metropolis of Baltimore made greater than $1.5 million in fraudulent funds to a scammer who efficiently spoofed a vendor and tricked metropolis staff into altering the contractor’s checking account data, town’s inspector common mentioned.
In a publish mortem of the incident, Baltimore Inspector Basic Isabel Mercedes Cumming mentioned town’s accounts payable division had did not implement corrective measures after earlier incidents of fraud and didn’t have correct protections in place to confirm provider particulars.
In December 2024, the fraudster submitted a provider contact kind utilizing the title of a official firm worker to realize entry to the seller’s Workday account. The individual the fraudster was impersonating didn’t have entry to the corporate’s financials, and the e-mail they supplied was not a company-issued deal with. Nonetheless, an worker inside accounts payable didn’t contact the seller to verify the individual’s identification.
The fraudster submitted a number of requests to alter the linked checking account in Workday, which was accepted by two staff. In February and March, Baltimore’s accounts payable made two funds — of greater than $800,000 and $721,000 — to the purported vendor, which they found might have been fraudulent after the recipient’s financial institution knowledgeable them of suspicious exercise. Town was capable of retrieve the smaller fee.
The seller rip-off is not less than the third to hit Baltimore’s metropolis authorities since 2019. In 2022, a fee from the Mayor’s Workplace of Youngsters and Household Success of greater than $376,213 ended up in a scammer’s account after the fraudster satisfied town’s finance division to alter account particulars. Three years earlier, $62,377 was despatched to a fraudulent account after modifications have been made to a vendor’s data.
In keeping with an inspector common report on the 2022 incident, town’s finance director mentioned new insurance policies had been instituted after the incident requiring the division’s staff to “independently confirm financial institution modifications with an executive-level worker from the requesting vendor.”
In a written response to the latest report, Accounts Payable Director Timothy Goldsby, Jr. mentioned that prior controls “weren’t totally institutionalized” earlier than the workplace moved from the Division of Finance to the Workplace of the Comptroller in January 2023.
“AP concurs with the Inspector Basic’s evaluation that the incident was enabled by vulnerabilities in verification procedures and inadequate provider account safeguards,” he wrote.
He mentioned within the wake of the incident the division is revising its working process for provider contact and banking updates and requiring cross-verification for any banking modifications. They’re additionally rising safeguards inside Workday, together with making a restricted consumer position to make delicate modifications to accounts and expanded coaching for employees to detect social engineering.
Baltimore has skilled a handful of impactful cyber incidents, together with a ransomware assault in 2019 that brought on an estimated $19 million in injury and affected providers for months.
Recorded Future
Intelligence Cloud.
Study extra.




















