TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Lost $10k as my email was hacked. Any ways to recover it?

109 点作者 milanmot超过 6 年前
I have suffered a loss of $10k due to an extremely unbelievable case of my client&#x27;s as well as my own email domain was hacked.<p>–----<p>So, I run a very small pharma export company in India. I have a client in Ontario, Canada with whom I have been doing regular business.<p>2 weeks ago I got an order worth $10000 from them. So as usual I dispatched the material to them and then raised the invoice with my bank details from my email address called &quot;abcde@mydomain .com&quot;.<p>Now on the next day my client received an email from &quot;abicde@mydomain.com&quot; stating that there is a change in invoice and revised invoice is again sent which had bank account details of a UK bank account.<p>Now an email like &quot;abicde@mydomain.com&quot; doesn&#x27;t exist at all.<p>My client asked me for a confirmation email again but this email never reached me. So the client made the payment and the money is already deducted from his account.<p>Also, what makes this even more strange is that I received a fake email from my client&#x27;s company with 3-4 times about not asking for payment as it will be delayed.<p>I got this email from an email address like &quot;klye@clientdomain.com&quot; instead of &quot;kyle@clientdomain.com&quot;.<p>Now $10000 in an extremely huge amount for survival of my company. I want to know what are my options and is there any way of recovering it.

25 条评论

CPLX超过 6 年前
I&#x27;m surprised I&#x27;m the first person to point this out, but you have not lost any money, your client has.<p>You sent the goods to the client, and they have yet to remit the payment to you. So they still owe you the money and you should insist they pay it.<p>Granted, they&#x27;re not going to like that, but the reality is they sent payment due to you to some other person. That&#x27;s something <i>they</i> did not something you did.<p>They may be in a position to take steps to recover the payment they sent to someone else, given the banks involved and so on, and they should try to do it. But that&#x27;s not something you&#x27;re really in a position to be involved in, you didn&#x27;t have anything to do with it and aren&#x27;t a party to the fraudulent transaction.<p>In the meantime they should return the goods or send you the payment they owe.
评论 #18310838 未加载
评论 #18310728 未加载
评论 #18311016 未加载
评论 #18310836 未加载
shyn3超过 6 年前
Your email did not get hacked most likely. Your client got tricked. They spoofed an email with your domain, but the reply-to email was their own (the attacker). So the client thinks they responded to you, but they responded to the fake address. Also, generally when they do this, they spoof the body and the conversation of the email.<p>Most likely, your client&#x27;s emails were compromised in this case. Ask them to forward you the original email received as an attachment, and the reply-email as an attachment.<p>Your client likely has to reach out to their banking institution. Most companies have safeguards against this on their end when sending money, specifically, when accounts change they get on the phone with someone using their Vendor list, not the communication from the email. Also, having multiple parties authorize a transfer.
评论 #18311896 未加载
评论 #18310746 未加载
czbond超过 6 年前
This is very common issue; I&#x27;ve personally helped a company after they lost much more than this, and had to help prove to insurance&#x2F;govt agencies&#x2F;etc. Turn on DKIM, DMARC, and SPF records for your mail domain. Also, never send invoices over email that contain any payment terms (eg: accounts, addresses to mail check to, etc) they should always be in some sort of protected portal. Tell every customer never to accept payment term details from you over email, phone, etc. If you or your client has insurance, start documenting every part of your case with screenshots into a file, and document everything you know NOW, including timestamps, etc.<p>EDIT: Also, I&#x27;d suggest taking orders via a secured portal, and also autheticating large orders by calling a number for a client you already have (never trust their website, or an email from them). Unfortunately, you&#x27;re out of luck that money.
评论 #18310503 未加载
评论 #18311004 未加载
ndespres超过 6 年前
If I&#x27;m reading your story correctly, it matches up with a tactic my clients have been seeing more lately. The scammer has already accessed your account because you fell for a phishing scam, typed your email credentials into a fake login site for a fake Office 365 or Dropbox page or something.<p>Now the scammers are watching your email closely waiting for the opportunity to do this. Waiting for you to send an invoice to your client, so they can jump in and send a revised invoice with their own payment details on it.<p>This can happen with intrusion into your email box, or your clients&#x27;. Hard to say exactly from your story. But either case, someone&#x27;s mailbox was accessed by the intruder. A similar scam is possible by just using similar domain names, but in such a case you wouldn&#x27;t know precise details of the invoices. You can just send a random fake invoice and hope the mark pays it or provides payment details in some way.<p>One thing worth noting in your story is that you aren&#x27;t out $10,000. Your client is the one who paid the money to the wrong party. They are the ones who need to work with their banks and reverse the payment. It&#x27;s not your fault that they paid the wrong person.
评论 #18310644 未加载
amorphous超过 6 年前
Immediately contact all the banks involved and report the fraud. They should be able to reverse the transaction.
评论 #18310830 未加载
drfuchs超过 6 年前
Your client got defrauded, arguably through no fault of your own. They never paid you, so they still owe you. Good luck with this approach, though. IANAL<p>Edit: I see CPLX has said it much better than I in the meantime. Note that it’s not at all clear that the hack happened on your end, rather than your client’s (or perhaps at some intermediate ISP).
moviuro超过 6 年前
Banking standards <i>here in the EU</i> impose a 13 months period during which the sender (order sender) can ask for a full refund. Check your local rules. This has to be talked about with the respective banks involved (that of your client + the one that received payment), as I believe you can&#x27;t do anything anymore.<p>Next time, use more than one communication channel (Facebook, phone, signal, telegram, whatsapp... anything, really)<p>You should also see with your domain registrar and mail provider what happened.
评论 #18310298 未加载
评论 #18310990 未加载
maximp超过 6 年前
Just so you know, the Reply All podcasts takes on (and helps solve) cases just like these.
xte超过 6 年前
My two cent: any business should have ALSO a phone number, perhaps not immediately reachable, but still a phone number. Perhaps also a fax number, old but still useful in emergency.
评论 #18315581 未加载
nimbius超过 6 年前
here in the US, we have the financial fraud kill chain for transfers greater than 50,000 dollars. Other countries have used it as well. you may wish to contact the CSIS for methods they use to short-circuit these transactions.<p><a href="https:&#x2F;&#x2F;rmacounts.com&#x2F;uncategorized&#x2F;financial-fraud-kill-chain&#x2F;" rel="nofollow">https:&#x2F;&#x2F;rmacounts.com&#x2F;uncategorized&#x2F;financial-fraud-kill-cha...</a>
forkerenok超过 6 年前
A couple of humble suggestions:<p>1. Get&#x2F;Hire someone to do a proper analysis of the &quot;breach&quot;. This may require your client&#x27;s cooperation.<p>2. Regardless of whose fault that was, try to improve the process to protect yourself and your clients in the future (e.g. email signing, confirmation via a different channel, different way of collecting payments etc.)
评论 #18343433 未加载
Symbiote超过 6 年前
This is fairly common fraud in the UK. See this for background:<p><a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;money&#x2F;2018&#x2F;oct&#x2F;18&#x2F;banks-to-check-account-names-to-beat-transfer" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;money&#x2F;2018&#x2F;oct&#x2F;18&#x2F;banks-to-check...</a>
jiveturkey超过 6 年前
one important thing you didn&#x27;t state, was this $10k order typical for them, or especially outsized. another important thing, you didn&#x27;t state how any discussion to date has already gone with the client.<p>anyway, no matter, you are in india, the client&#x2F;customer is in canada? the amount is only $10,000 and you are a &quot;very&quot; small company? you have no practical recourse.<p>i&#x27;d even give small odds that the client is in fact scamming you.<p>regardless, good luck but in the face of an uncooperative client, you&#x27;re out of luck.<p>many of the arguments here are around legal correctness, who is at fault, etc. but they fail to take into account that you are too small and the amount is too small and across international borders, for you to do anything about it. now if the amount were $100,000 you&#x27;d be able to pursue it.
C1sc0cat超过 6 年前
You need to speak to the bank regulators an consider talking the press<p>In the UK the Daily Telegraph finance team they have been covering this in their weekend issues and have had some success in getting things changed here.
huehehue超过 6 年前
I wonder if a <i>client</i> has ever set up a scam like this.<p>They send a fake-looking email to themselves (using existing invoices as a template), then feign ignorance and refuse to pay for goods&#x2F;services because &quot;we sent the money, not our fault you didn&#x27;t get it&quot;.<p>Even better that they&#x27;d send a few emails saying &quot;we&#x27;re working on paying you, don&#x27;t bug us about it&quot; -- payments are harder to collect as time passes for a number of reasons (in my experience).
评论 #18310850 未加载
milanmot超过 6 年前
Email headers of the fake email I received are below. Can anyone identify anything out it?<p>-------<p>Received: (qmail 30963 invoked by uid 30297); 16 Oct 2018 19:04:18 -0000<p>Received: from unknown (HELO sg2plibsmtp01-1.prod.sin2.secureserver.net) ([182.50.144.11])<p><pre><code> (envelope-sender &lt;klye@clientdomain.com&gt;) by sg2plsmtp19-01-25.prod.sin2.secureserver.net (qmail-1.03) with SMTP for &lt;reema@mydomain.net&gt;; 16 Oct 2018 19:04:18 -0000 </code></pre> Received: from se1-lax1.servconfig.com ([104.244.124.86])<p><pre><code> by bizsmtp with ESMTP id CUdcgdXtBUMdaCUdegyEaT; Tue, 16 Oct 2018 12:04:18 -0700 </code></pre> Received: from res203.servconfig.com ([192.145.239.44])<p><pre><code> by se1-lax1.servconfig.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from &lt;klye@clientdomain.com&gt;) id 1gCUdY-0005Jd-Kn; Tue, 16 Oct 2018 15:04:16 -0400 </code></pre> Received: from [::1] (port=46403 helo=res203.servconfig.com)<p><pre><code> by res203.servconfig.com with esmtpa (Exim 4.91) (envelope-from &lt;klye@clientdomain.com&gt;) id 1gCUdY-00GWW5-7H; Tue, 16 Oct 2018 12:04:12 -0700 </code></pre> MIME-Version: 1.0<p>Content-Type: multipart&#x2F;alternative;<p>boundary=&quot;=_cb44418026f16861773c2073108229cd&quot;<p>Date: Tue, 16 Oct 2018 12:04:12 -0700<p>From: Kyle &lt;klye@clientdomain.com&gt;<p>To: Reema&lt;reema@mydoamin.net&gt;<p>Cc: &#x27;mail&#x27; &lt;mail.globax@dr.com&gt;<p>Subject: RE: pharma zonisamide<p>Reply-To: Kyle &lt;Kyle.clientname@dr.com&gt;<p>Mail-Reply-To: Kyle &lt;Kyle.clientname@dr.com&gt;<p>Message-ID: &lt;4d778f3b89a049b84840dbdb372798b8@clientname.com&gt;<p>X-Sender: Klye@clientname.com<p>User-Agent: Roundcube Webmail&#x2F;1.3.3<p>X-Get-Message-Sender-Via: res203.servconfig.com: authenticated_id: shahrukh@makamil.com<p>X-Authenticated-Sender: res203.servconfig.com: shahrukh@makamil.com<p>X-Originating-IP: 192.145.239.44<p>X-SpamExperts-Domain: res203.servconfig.com<p>X-SpamExperts-Username: 192.145.239.44<p>Authentication-Results: servconfig.com; auth=pass smtp.auth=192.145.239.44@res203.servconfig.com<p>X-SpamExperts-Outgoing-Class: unsure<p>X-SpamExperts-Outgoing-Evidence: Combined (0.35)<p>X-Recommended-Action: accept<p>X-Filter-ID: EX5BVjFpneJeBchSMxfU5rwL&#x2F;g85tQulnBE8gPHu3&#x2F;F602E9L7XzfQH6nu9C&#x2F;Fh9KJzpNe6xgvOx<p>q3u0UDjvO73ACdMYEFGu+gF5O7WstgsinfpazlJl1tCn592ZdmdEXY8S&#x2F;zCkg36vZ3GfohIs0UGl<p>z8CJSOMrvzx9TVg3RkVXN8poxUmHw7z8Cv3zSk4rk5hzVqcRQipB56OduRZxKuP+q8NuOKfRBnSy<p>EKI1nLnoREI39Ng7w+jWwVgutjGnTGAA1gLIPnzkgagc0cD3QuccXSndMw0FQ8jqfUr8AYYpMlsI<p>IQUIsICEfKR4uJdogE2eQHlogxUcYs0rxQ+mI9H9Xex&#x2F;9Lq8f02pgNORt7R9OjAEo9UzDH0ARpN0<p>wUZt3fvT7ao3SadG2ABiWXtkF0i&#x2F;CT5LMFdUTCs59oTfl5U&#x2F;c8+QAw6oOeWTc8nT5GWcPd0rEuGj<p>FyZoidhtHm+WobglkKcTLdh5JwRD9s9xE+dH789QVPIx9duafGFU3kR9F9u9KyBXj+FNLU1SvJx5<p>&#x2F;9jlDHh8k6TTdHl8m1&#x2F;8O&#x2F;8FS0gu&#x2F;BXEFm6f2M41IWv&#x2F;Qw0zmRSx+YTH48mhNBhct&#x2F;JFBLt+LA62<p>e0Pg9eDnrJN9b+G2BSscQzbFMcfSu4J7ix6iCoZ5CaKPMqg2RgTcAelen7CXsT6fZe+0gbPIz96e<p>qtNrhqU0j58VnbXM&#x2F;vIJoxTw4G77xMwEh26uoYRpiF4am0X83e22zM8wHY&#x2F;QU2XjdKVHj6Omz2pU<p>52OZqldRRmxkB&#x2F;4b3LJEbiGaRFZKY17WKvlei&#x2F;52nCwh3EKwhLPN528N6lMd564J8QyHtUdRVUYN<p>O3udn1JlHoAi4F0jBWcShbww79KoIp0Sgs8f&#x2F;ZTrGlUY2jbf3Q54l9HRkQvIejKclyAbTmc6f&#x2F;07<p>0aI4MKggmD9XUhkU65ggFOIOfY0If3FAzbmaNBxeMIrqE6TxR86t2EiC6GwMws7GvvozwLzzGiRR<p>EvmQrtvSbV4fnBHAY64qloNFm00WuJU2Ru5B4WNJiz4C8c3Na3gFdtxXZg==<p>X-Report-Abuse-To: spam@se1-lax1.servconfig.com<p>X-CMAE-Envelope: MS4wfGTkLN5Q3Etz9Wkc3k&#x2F;s+48X4HLNxcMTgPNW9dd3KWT52iaJK7tSMbsyZjm0&#x2F;hi9J87LipDUTpWV2p&#x2F;qyIS3IuuXa62TTzrOmM1SRoaJXZY91Lfa&#x2F;lzj<p>i8Jb2TdRHL58hBIRNSmmPIf9tFZ8lSpapy&#x2F;8CF5h3TDIczyZlwy+0j+T7U+zeMfEALDdLQAg1NCO7Q==<p>X-Nonspam: None
评论 #18310753 未加载
评论 #18310631 未加载
评论 #18310576 未加载
评论 #18310868 未加载
matt_the_bass超过 6 年前
Maybe this is a dumb question, but have you talked to your customer about this? Such issues are covered by insurance plans that are common for US companies. It may be as simple as your customer makes a police report and then provide it to their insurance. Then 60 days later they get a check and pay you.
rnotaro超过 6 年前
Your case is really similar to this attack (`How a fraudster got $12 million out of a Canadian university: They just asked for it`): <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18186433" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18186433</a>
hawkilt超过 6 年前
you or your client using Google’s Gsuite as email service provider?<p>cause the same thing happened to one of client in Chennai, India.<p>but they client didnt tranfer the funds since he found that the bank account the fake guy sent was new to them. so the client called orginal company back and reported it.
gagabity超过 6 年前
Unless I am missing something I dont see a hack here, just some spoofed emails.
评论 #18310493 未加载
评论 #18310513 未加载
masonic超过 6 年前
For a similar recent case, see<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18318226" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18318226</a>
darkhorn超过 6 年前
Make sure you have set up SPF, DKIM and DMARC. Also use email certificate.
divitics超过 6 年前
An interesting case, I have never heard of this type of fraud
21stio超过 6 年前
Maybe your business partner is trying to scam you.
rasz超过 6 年前
You didnt lose 10K, your client did.