In partnership with

πŸ‘‹ Welcome to Unlocked

The end of the year brings more than celebrations. It creates high-risk conditions for financial fraud β€” when executives are traveling, teams are short-staffed, and approval workflows are rushed.

While phishing remains the #1 initial attack vector (Verizon DBIR), year-end business email compromise (BEC) campaigns now exploit something different: predictable stress and urgency during the holiday window.

These attacks are becoming:

  • more targeted

  • more automated

  • more timed to workflow pressure

This week we’re breaking down why year-end fraud surges β€” and what IT and security leaders can do about it before the books close.

🎭 Executive Spoofing: Why Leadership Is Target #1

Attackers spoof executives because authority + urgency bypass critical thinking.

Common patterns include:

  • look-alike domains impersonating CEOs/CFOs

  • urgent requests for confidential transfers

  • β€œquick favor” messages targeting assistants or finance teams

  • spoofed mobile messages during travel

Business Email Compromise caused over $2.9B in reported losses in 2023 (FBI IC3), making it one of the costliest enterprise threats β€” and the FBI has repeatedly noted spikes during holiday periods.

Even when MFA protects accounts, attackers shift tactics:

  • spoof identity, not login

  • exploit urgency, not access controls

BEC succeeds because it weaponizes trust, not technology.

πŸ’³ Gift Card + Invoice Fraud: Why December Is Prime Season

Gift card scams sound outdated β€” but they persist because they blend seamlessly into year-end business routines.

Seasonal fraud patterns:

  • executive asks assistant to buy gift cards for clients

  • fraudulent invoice attached to an urgent email

  • finance processing during deadline crunch

  • amounts small enough to avoid fraud detection thresholds

Why it works:

  • urgency overrides verification

  • delegation hides illegitimacy

  • holidays normalize gift spending

Research from the ACFE shows fraud attempts increase during staffing shortages and calendar transitions, and invoice spoofing remains one of the fastest-growing vectors in BEC.

The holidays are when mistakes happen quietly β€” and attackers know it.

πŸ” The Financial Closing Window: A Breach Opportunity

December financial workflows create predictable vulnerabilities that adversaries exploit:

  • first-time vendor payments rush through

  • multi-team approvals break down

  • reduced oversight during PTO

  • travel introduces mobile-only verification

Deloitte’s payment fraud research found executive-impersonation attempts spike during quarter-close periods, when controls loosen under pressure.

Attackers track seasonal workflows and adapt campaigns to them. Year-end bookkeeping isn’t just a process vulnerability β€” it’s a predictable threat window.

🧠 Why These Scams Still Work

Holiday BEC works because it relies on human instinct, not technical compromise.

Key psychological triggers:

  • perceived authority

  • compressed timelines

  • guilt over delaying executives

  • reduced concentration during fatigue

  • disrupted work routines

The attacker’s advantage isn’t sophistication β€” it’s timing and automation.

Attackers automate:

  • reconnaissance

  • spoofed sender profiles

  • invoice insertion

  • executive persona replication

Meanwhile defenders struggle because the burden falls on people making fast decisions, not systems blocking malicious ones.

πŸ›‘οΈ How IT + Security Teams Can Reduce Holiday BEC Risk

Practical, high-leverage defenses:

β€’ require verbal verification for executive transfers
β€’ enforce dual approval workflows for first-time vendor payments
β€’ block external senders using internal-domain look-alikes
β€’ flag mobile-device approvals during executive travel
β€’ alert on mailbox rule changes + forwarding configuration

Technical safeguards to implement now:

  • enforce DMARC/DKIM/SPF

  • deploy BEC-focused filtering rules

  • perform identity-based anomaly scoring

  • restrict privilege escalation via tiered access

These controls reduce risk without slowing business operations β€” which is critical during end-of-year deadlines.

πŸ’‘ Unlocked Tip of the Week

Require escalation for gift card requests.

If an exec sends a message requesting a purchase:

  • escalation to finance lead + verbal confirmation

  • no exceptions, especially during holiday cycles

90% of organizations that implement this control report dramatically reduced gift card fraud pressure.

Small friction β†’ big reduction in social engineering risk.

πŸ“Š Poll of the Week

πŸ™‹ Author Spotlight

Meet Kaden Rourke - Senior Security Engineer

Kaden Rourke is a Senior Security Engineer with 12+ years of experience designing and implementing secure authentication systems used by millions of users worldwide. Before joining Everykey, Elias led identity engineering initiatives at two venture-backed SaaS companies and contributed to open-source projects focused on hardware-backed cryptography and decentralized access control.

βœ… Wrapping Up

Year-end cyber fraud succeeds not because controls fail β€”
but because process discipline collapses under pressure.

Holiday fraud targets:

  • authority structures

  • psychology

  • timing

  • identity trust

As attackers move toward automated social engineering workflows, defenses must shift to automated verification and identity-aware anomaly detection β€” especially during seasonal capacity strain.

Stay curious. Stay prepared.

Until next time,

The Everykey Team

About Our Sponsor

The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.

Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.

The data shows:

  • Only 10% of shoppers buy through AI-recommended links

  • 87% discover products through creators, blogs, or communities they trust

  • Human sources like reviews and creators rank higher in trust than AI recommendations

The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.

Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.



Keep Reading

No posts found