Ubiquiti Networks: $46.7 Million Wired to Hong Kong Fraudsters via Email
A Finance department employee at Ubiquiti was deceived by emails impersonating the CEO and external legal counsel into authorising 17 wire transfers totalling $46.7 million to accounts in Hong Kong, Poland, Hungary, and Russia.
Background
Business Email Compromise (BEC) became the FBI's highest-loss cybercrime category in 2015. Ubiquiti Networks, a Silicon Valley networking hardware company, processed international wire transfers as part of normal operations. Attackers had studied the company's corporate structure and communication patterns.
The Attack
Attackers registered a lookalike domain nearly identical to Ubiquiti's legitimate domain and used it to send emails appearing to come from the CEO and outside legal counsel. The emails requested a series of urgent, confidential wire transfers for a supposed acquisition. No phone verification was requested or performed. Finance staff, believing the requests were legitimate, executed 17 transfers over several weeks totalling $46.7 million to bank accounts across four countries.
Response
Ubiquiti discovered the fraud in June 2015. The FBI was notified and assisted with recovery efforts. Approximately $8.1 million was recovered. The company tightened its wire transfer authorisation procedures and disclosed the incident in a quarterly SEC filing.
Outcome
The $46.7 million loss ($38.6 million unrecovered) was disclosed publicly in SEC filings, exposing the company to additional reputational damage. The case became a canonical example of BEC fraud and was used by the FBI to train organisations on the threat. Ubiquiti's share price dropped on disclosure.
Key Takeaways
- All large wire transfers must be verified by phone call to a pre-registered number — never to a number in the email
- BEC attackers study company org charts and communication styles for weeks before striking
- Finance staff need specific training on email impersonation — the CEO will not email instructions for secret wire transfers
- Dual-authorisation controls for transfers above a threshold prevent single-person fraud