Intercepted email scams are increasing at an alarming rate in South Africa.
How does an intercepted email scam happen?
First, they gain unauthorized access to your email account, through spoofing, clicking unknown links etc. Then, they patiently monitor your email activities, waiting for the right moment to strike.
The right moment is typically when you are in the market for a certain product or service – your guard will be down, as you would be expecting to pay someone. They intercept the authentic email, for say goods you ordered, and spuriously amend the authentic bank details, to their bank account details.
By the time you contact your bank, the funds have been cleared, leaving you out of pocket and violated.
How to avoid being a victim – manage your risk
1. Voice Verification
Voice verify payment requests, requests for sensitive data, or invoice changes – regardless of the source. Make sure you call the actual company who is supplying the goods, in other words, avoid using the contact numbers on the invoice, as these are likely to be false as well. The thoroughness of the verification should be in direct proportion to the monetary value of the transaction i.e. the higher the amount you are paying, the more thorough your checking should be, before paying.
2. Anti Spoofing & Gmail and the like
Heard of the terms SPF, DKIM & DMARC? Most normal people haven’t, but your IT guy certainly should know them. These are anti spoofing tools that validate the sender of the email and analyze all inbound email. If you use a service like Gmail it is critical that you activate two-factor authentication, which significantly reduces the risk of scammers compromising your email in the first place. And of course, ensure you set strong and long passwords, which are changed regularly.
3. Don’t Trust Unknown Sources
Avoid clicking on links, downloads, videos etc. from unknown sources, as often this is how fraudsters gain access to your email account, unbeknownst to you.
4. Anti Virus Software
Make sure you have anti virus software installed on all your electronic devices and ensure that this software is updated regularly.
5. WiFi Networks
Be extremely careful when joining any WiFi network. many peoples devices or emails are compromised when accessing unsecure WiFi networks. Common examples include using free WiFi offered by hotels, restaurants etc. they may be free, but how safe is it?
6. Risk Transfer
We believe that it is essential to manage your risk. We also believe in transferring risk to an insurance policy for peace of mind, as no matter how well you manage your risk, things still go wrong.
Chadwicks has insurance solutions to protect you against this type of scam.
Please contact us if you are interested.
Until next time, stay scam alert and stay insured.
Categories
Get a Quote
Recent News
This article was written by Tim Chadwick and published by Money Marketing on 29 October 2025 If the Maersk AMEX route closure on 01 October has caught you off guard, it is worth pausing to reflect on the broader logistics risk landscape. The…
This article was written by Tim Chadwick and published by News24 on 27 October 2025 Earlier this month a bus caught fire inside Africa’s longest road tunnel, the Huguenot Tunnel. The flames were sorted out “chop chop”. The traffic,…
Treat your business insurance renewal, like you treat an audit Most businesses review the premium and move on. But renewal is the time to check whether your cover still matches your risk and whether you are getting value for…


