Ubiquiti Networks: $46.7 Million Wired to Hong Kong Fraudsters via Email

A Finance department employee at Ubiquiti was deceived by emails impersonating the CEO and external legal counsel into authorising 17 wire transfers totalling $46.7 million to accounts in Hong Kong, Poland, Hungary, and Russia.

Ubiquiti Networks·2015·2 min read

Background

Business Email Compromise (BEC) became the FBI's highest-loss cybercrime category in 2015. Ubiquiti Networks, a Silicon Valley networking hardware company, processed international wire transfers as part of normal operations. Attackers had studied the company's corporate structure and communication patterns.

The Attack

Attackers registered a lookalike domain nearly identical to Ubiquiti's legitimate domain and used it to send emails appearing to come from the CEO and outside legal counsel. The emails requested a series of urgent, confidential wire transfers for a supposed acquisition. No phone verification was requested or performed. Finance staff, believing the requests were legitimate, executed 17 transfers over several weeks totalling $46.7 million to bank accounts across four countries.

Response

Ubiquiti discovered the fraud in June 2015. The FBI was notified and assisted with recovery efforts. Approximately $8.1 million was recovered. The company tightened its wire transfer authorisation procedures and disclosed the incident in a quarterly SEC filing.

Outcome

The $46.7 million loss ($38.6 million unrecovered) was disclosed publicly in SEC filings, exposing the company to additional reputational damage. The case became a canonical example of BEC fraud and was used by the FBI to train organisations on the threat. Ubiquiti's share price dropped on disclosure.

Key Takeaways

  1. All large wire transfers must be verified by phone call to a pre-registered number — never to a number in the email
  2. BEC attackers study company org charts and communication styles for weeks before striking
  3. Finance staff need specific training on email impersonation — the CEO will not email instructions for secret wire transfers
  4. Dual-authorisation controls for transfers above a threshold prevent single-person fraud
BECwire fraudCEO impersonationlookalike domainfinance fraud