Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceBanking/Finance/InsuranceConstruction, Real Estate, Property Management

How to defend against real estate wire fraud

By Matt Lindley
wire fraud cyber security
January 25, 2022

Over the past several years, real estate prices have exploded. The average home in the United States sold for $278,000 at the beginning of 2012, a number that spiked to more than $450,000 in less than a decade. While this trend has been a boon for real estate owners, it has a dark side: real estate cyber fraud has surged, and cybercriminals have developed increasingly sophisticated tactics for manipulating sensitive documents and stealing money in real estate transactions.

One of the most common cyberattacks in the real estate industry is wire fraud, which refers to cybercriminals intercepting payments from buyers to legitimate financial institutions. While cybercriminals often use business email compromise to carry out these attacks, they’re increasingly deploying malware capable of corrupting files on victims’ computers and altering documents such as wire transfer instructions. This means buyers, escrow agents, lenders and anyone else involved in real estate transactions has to be on guard against a broader range of attacks than ever before.

These are all reasons why it’s vital to verify before you trust when it comes to real estate transactions: check digital files against any hard copies available, confirm account numbers and other information with the relevant agencies and institutions, and recognize that some methods of verification (such as phone calls) can still expose participants to third-party risk, as other engaged parties could be relying upon manipulated documents.

An alarming trend in the real estate industry

Considering the amount of money involved in real estate transactions every day, it’s no surprise that cybercriminals view the industry as one big target. The FBI tracks annual losses from many different categories of cyberattacks, and the agency recently reported a dramatic increase in real estate/rental losses, from under $150 million in 2018 to more than $213 million in 2020. Real estate cyberattacks cost victims more than several other major types of criminal activity, including credit card fraud, corporate data breaches and government impersonation.

The perpetrators of wire fraud often rely on business email compromise (by far the most financially destructive type of cyberattack, costing victims more than $1.8 billion last year alone), which means they assume the identity of a real estate agent or closing attorney to trick buyers or their representatives into sharing sensitive information or transferring funds. However, cybercriminals are also infecting victims’ devices with malware that can scan their files for keywords like “wire instructions” and alter documents. For example, account and routing numbers can be changed to direct transfers of funds into fraudulent accounts.

As the number of attack vectors continues to rise, real estate buyers and professionals will need to apply the verify before you trust principle to a wider range of activities — from sending emails to reviewing documents.

How real estate wire fraud is evolving

Real estate wire fraud has become so ubiquitous that there’s a coalition of companies and industry groups dedicated to raising awareness about it. But since the Coalition to Stop Real Estate Wire Fraud was established, attacks have only increased — there were 11,300 victims in 2018, but more than 13,600 in 2020. One of the reasons wire fraud is proving to be such a stubborn problem is the fact that cybercriminals have discovered ways to bypass security measures, access sensitive information and steal ever-larger sums of money.

One of the reasons digital document manipulation is so disturbing is the fact that buyers and other real estate professionals can have safeguards in place (such as call-to-verify policies) and still end up as victims of wire fraud. For example, when home or commercial real estate buyers call loan officers to verify that they’re sending a down payment to the right account (a responsible practice that has likely prevented countless cyberattacks), this safety measure could be exploited by cybercriminals who may have altered a file on the officer’s device.

Even when banks or escrow agents have been using the same set of wire transfer instructions for years, they need to check account numbers and other information against hard copies and any other form of backup information available. Meanwhile, all other cybersecurity measures (cross-checking email addresses with legitimate entities, verifying phone numbers and login information and so on) have to be observed more faithfully than ever, as cybercriminals who carry out real estate fraud have proven adept at creating convincing spoofs and deceptions.

Putting “verify before you trust” into practice

Any time a large financial transaction takes place, especially when wire instructions are involved, both parties should adopt a verify before you trust approach: the recipient should verify details with the source and inside the document, while the sender should ask for this verification.

According to a March 2021 survey of title agents, more than three-quarters said the number of wire fraud attempts they experienced stayed the same or increased from 2019 to 2020. A staggering one-third of real estate transactions were targeted by scammers, while a full recovery of stolen funds was only secured in 29% of wire fraud cases. Still, the FBI was able to freeze $380 million of the $462 million in reported wire fraud losses in 2020 — a reminder that reporting suspected fraud as early as possible is critical to help the authorities interdict fraudulent transfers.

Everyone involved in a real estate transaction has to know exactly who they’re talking to at all times. Confirm identities by double checking contact information through official channels, refuse to click on links or attachments in unsolicited texts or emails, and verify in person whenever possible. Red flags should immediately be hoisted if a financial professional or anyone else associated with a real estate transaction is suddenly insisting that things have to be done quickly, or if there are any inconsistencies in their communications (from email addresses and contact information to the format of messages to signatures).

At a time when cybercriminals are getting better and better at circumventing these detection methods, verify before you trust has to be a core principle at all times. When everyone involved in the real estate buying process puts this principle first, the risk of wire fraud will plummet.

KEYWORDS: bank cybersecurity cyber fraud financial crime Financial Cyber Security fraud home security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matt Lindley is COO and CISO at NINJIO.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Security’s 2025 Women in Security

Security’s 2025 Women in Security

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • real estate

    Financial fraud legislation aims to combat real estate money laundering

    See More
  • hackers

    How to defend against human operated ransomware

    See More
  • video conference

    How to Defend Against Digital Surveillance when Teleworking

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing