Skip to main content

Select a Category:

Fake Invoice Scam

In this scam, businesses are typically sent an email with a fake invoice, claiming to be from a company that they do business with, informing them of a bank account switch and to re-direct their payments to the “new” account number. Many of these “invoices” appear at first glance to be legitimate bills, and may include threatening or confusing legal jargon to create a false sense of urgency to pressure recipients to make quick payments.

Protect Your Business

Business Email Compromise (BEC)

A business email compromise (BEC) is an exploit in which the criminal impersonates a senior executive at a company, either by gaining access to their corporate email account or by creating a fake one. Through the use of social engineering tactics and research, often through social media, the criminal will craft credible emails and send them to someone within the company who likely has the authority to move money in hopes of tricking them into transferring money to a fraudulent account.

Protect Your Business

Spear phishing

Spear phishing is an email spoofing scam where criminals target a specific organization or employee with tailored messages, to gain unauthorized access to sensitive information, funds or computer systems. In a spear phishing scam, people within a company receive an email asking them to provide the sender with confidential company information. The email will look like it came from someone within the company, so they are more likely to trust them.

Criminals can gather information – typically via social networking sites – about their targets, like: email addresses, job titles, and interests, etc., and use it to send convincing, but fraudulent emails.

Protect Your Business

Ransomware

Ransomware is a form of malicious software (malware) that enables cyber criminals to remotely lock down files on your computer or mobile device. The criminals will use the ransomware to extort money from you before they restore your access to the files. A computer can be infected by ransomware a number of ways but most commonly it involves victims clicking on a malicious link or attachment received through a phishing email. Once infected victims will see a "ransom" note which is often designed to scare or extort the victims into making payment.

Protect Your Business

Need to Report Online Fraud?

Phone Icon

Call Us

If you believe your confidential information may have been stolen or obtained by a fraudulent party either online, by telephone or through any other means, call us immediately.

If you believe your confidential information may have been stolen or obtained by a fraudulent party either online, by telephone or through any other means, call us immediately.

Learn more

Report Icon

Report ID Fraud

If you think you are a victim of identity fraud and you are an RBC client

If you think you are a victim of identity fraud and you are an RBC client

Learn more

Email Icon

Email/Website Fraud

If you have received a suspicious email or accessed a fraudulent RBC website

If you have received a suspicious email or accessed a fraudulent RBC website

Learn more