Email Fraud Rampant

24 February 2023

Intercepted email scams are increasing at an alarming rate in South Africa.

How does an intercepted email scam happen?

First, they gain unauthorized access to your email account, through spoofing, clicking unknown links etc. Then, they patiently monitor your email activities, waiting for the right moment to strike.

The right moment is typically when you are in the market for a certain product or service – your guard will be down, as you would be expecting to pay someone. They intercept the authentic email, for say goods you ordered, and spuriously amend the authentic bank details, to their bank account details.

By the time you contact your bank, the funds have been cleared, leaving you out of pocket and violated.

How to avoid being a victim – manage your risk

1. Voice Verification

Voice verify payment requests, requests for sensitive data, or invoice changes – regardless of the source. Make sure you call the actual company who is supplying the goods, in other words, avoid using the contact numbers on the invoice, as these are likely to be false as well. The thoroughness of the verification should be in direct proportion to the monetary value of the transaction i.e. the higher the amount you are paying, the more thorough your checking should be, before paying.

2. Anti Spoofing & Gmail and the like

Heard of the terms SPF, DKIM & DMARC? Most normal people haven’t, but your IT guy certainly should know them. These are anti spoofing tools that validate the sender of the email and analyze all inbound email. If you use a service like Gmail it is critical that you activate two-factor authentication, which significantly reduces the risk of scammers compromising your email in the first place. And of course, ensure you set strong and long passwords, which are changed regularly.

3. Don’t Trust Unknown Sources

Avoid clicking on links, downloads, videos etc. from unknown sources, as often this is how fraudsters gain access to your email account, unbeknownst to you.

4. Anti Virus Software

Make sure you have anti virus software installed on all your electronic devices and ensure that this software is updated regularly.

5. WiFi Networks

Be extremely careful when joining any WiFi network. many peoples devices or emails are compromised when accessing unsecure WiFi networks. Common examples include using free WiFi offered by hotels, restaurants etc. they may be free, but how safe is it?

6. Risk Transfer

We believe that it is essential to manage your risk. We also believe in transferring risk to an insurance policy for peace of mind, as no matter how well you manage your risk, things still go wrong.

 

Chadwicks has insurance solutions to protect you against this type of scam.

 

Please contact us if you are interested.

 

Until next time, stay scam alert and stay insured.

Recent Articles

You Have Been Stormed

This article was written by Tim Chadwick and published by ITWeb, Lifestyle & Tech and AI Impact on 21 April 2026   Waiting #Specialized #BusinessCyber #RiskManagement #CutRiskNotCorners     Everyone at some point clicks something they should not have. An email…

Read More

#Business #Engineering #RiskManagement This article was written by Tim Chadwick and published by MoneyMarketing on 30 March 2026   Somewhere Near Dubai The Strait of Hormuz, until recently, occupied the same mental real estate for most South Africans as your IT guys 2 hour…

Read More

Before The Flatbed.

#PersonalInsurance #Claims This article was written by Tim Chadwick and published by News24 on 29 March 2026   This is a true story. It has been all over the media. Mr Pierre Coetsee suffered a misfortune, circa October 2025. His 2023 Defender incinerated itself….

Read More