Year-End Fraud Pressure: Executive Spoofing and Gift Card Attacks
🔓 Unlocked - Edition #17 - Tuesday, December 23rd, 2025
In partnership with

đź‘‹ Welcome to Unlocked
The end of the year brings more than celebrations. It creates high-risk conditions for financial fraud — when executives are traveling, teams are short-staffed, and approval workflows are rushed.
While phishing remains the #1 initial attack vector (Verizon DBIR), year-end business email compromise (BEC) campaigns now exploit something different: predictable stress and urgency during the holiday window.
These attacks are becoming:
- more targeted
- more automated
- more timed to workflow pressure
This week we’re breaking down why year-end fraud surges — and what IT and security leaders can do about it before the books close.
🎠Executive Spoofing: Why Leadership Is Target #1
Attackers spoof executives because authority + urgency bypass critical thinking.
Common patterns include:
- look-alike domains impersonating CEOs/CFOs
- urgent requests for confidential transfers
- “quick favor” messages targeting assistants or finance teams
- spoofed mobile messages during travel
Business Email Compromise caused over $2.9B in reported losses in 2023 (FBI IC3), making it one of the costliest enterprise threats — and the FBI has repeatedly noted spikes during holiday periods.
Even when MFA protects accounts, attackers shift tactics:
- spoof identity, not login
- exploit urgency, not access controls
BEC succeeds because it weaponizes trust, not technology.
đź’ł Gift Card + Invoice Fraud: Why December Is Prime Season
Gift card scams sound outdated — but they persist because they blend seamlessly into year-end business routines.
Seasonal fraud patterns:
- executive asks assistant to buy gift cards for clients
- fraudulent invoice attached to an urgent email
- finance processing during deadline crunch
- amounts small enough to avoid fraud detection thresholds
Why it works:
- urgency overrides verification
- delegation hides illegitimacy
- holidays normalize gift spending
Research from the ACFE shows fraud attempts increase during staffing shortages and calendar transitions, and invoice spoofing remains one of the fastest-growing vectors in BEC.
The holidays are when mistakes happen quietly — and attackers know it.
🔍 The Financial Closing Window: A Breach Opportunity
December financial workflows create predictable vulnerabilities that adversaries exploit:
- first-time vendor payments rush through
- multi-team approvals break down
- reduced oversight during PTO
- travel introduces mobile-only verification
Deloitte’s payment fraud research found executive-impersonation attempts spike during quarter-close periods, when controls loosen under pressure.
Attackers track seasonal workflows and adapt campaigns to them. Year-end bookkeeping isn’t just a process vulnerability — it’s a predictable threat window.
đź§ Why These Scams Still Work
Holiday BEC works because it relies on human instinct, not technical compromise.
Key psychological triggers:
- perceived authority
- compressed timelines
- guilt over delaying executives
- reduced concentration during fatigue
- disrupted work routines
The attacker’s advantage isn’t sophistication — it’s timing and automation.
Attackers automate:
- reconnaissance
- spoofed sender profiles
- invoice insertion
- executive persona replication
Meanwhile defenders struggle because the burden falls on people making fast decisions, not systems blocking malicious ones.
🛡️ How IT + Security Teams Can Reduce Holiday BEC Risk
Practical, high-leverage defenses:
• require verbal verification for executive transfers
• enforce dual approval workflows for first-time vendor payments
• block external senders using internal-domain look-alikes
• flag mobile-device approvals during executive travel
• alert on mailbox rule changes + forwarding configuration
Technical safeguards to implement now:
- enforce DMARC/DKIM/SPF
- deploy BEC-focused filtering rules
- perform identity-based anomaly scoring
- restrict privilege escalation via tiered access
These controls reduce risk without slowing business operations — which is critical during end-of-year deadlines.
đź’ˇ Unlocked Tip of the Week
Require escalation for gift card requests.
If an exec sends a message requesting a purchase:
- escalation to finance lead + verbal confirmation
- no exceptions, especially during holiday cycles
90% of organizations that implement this control report dramatically reduced gift card fraud pressure.
Small friction → big reduction in social engineering risk.
📊 Poll of the Week
Which year-end vulnerability concerns your team most? |
🙋 Author Spotlight
Meet Kaden Rourke - Senior Security Engineer
Kaden Rourke is a Senior Security Engineer with 12+ years of experience designing and implementing secure authentication systems used by millions of users worldwide. Before joining Everykey, Elias led identity engineering initiatives at two venture-backed SaaS companies and contributed to open-source projects focused on hardware-backed cryptography and decentralized access control.
âś… Wrapping Up
Year-end cyber fraud succeeds not because controls fail —
but because process discipline collapses under pressure.
Holiday fraud targets:
- authority structures
- psychology
- timing
- identity trust
As attackers move toward automated social engineering workflows, defenses must shift to automated verification and identity-aware anomaly detection — especially during seasonal capacity strain.
Stay curious. Stay prepared.
Until next time,
The Everykey Team
Check out last week’s edition of Unlocked
About Our Sponsor
The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.
Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.
The data shows:
- Only 10% of shoppers buy through AI-recommended links
- 87% discover products through creators, blogs, or communities they trust
- Human sources like reviews and creators rank higher in trust than AI recommendations
The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.
Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.
Download the full report to see what this means for your brand.