Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»Scam – Fraudulent Purchase Orders
    Alerts

    Scam – Fraudulent Purchase Orders

    By Franklyn ZelayaJanuary 21, 2020Updated:January 21, 20202 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Purchase order fraud occurs when a scammer contacts a vendor and impersonates a legitimate customer. While posing as the representative of a legitimate organization, the scammer requests a quote and orders large quantities of a product, such as flash drives or mugs. The vendor ships the product to the fake company and bills the legitimate institution. Unfortunately, by this time the fraud is discovered too late and the vendor must absorb the lost purchase.  

    From time to time, vendors caught in these scams will report that someone has been impersonating Fordham University. The signs would be obvious to a Fordham employee, but could trick a vendor:

    • The email sender does not use an official @fordham.edu email address or uses a spoofed mailing address.
    • Email correspondence has poor grammar, spelling, and sentence structure.
    • The caller or sender is claiming to be an employee no longer associated with the University.
    • Descriptions are sparse and demand all items without the logo of the organization.
    • Phone numbers in the email are not associated with the University.
    • The payment method has changed without prior notification. For example, suddenly switching from physical checks to electronic payment.
    • The shipping address on the purchase order is not Fordham University’s address or property associated with Fordham.
    • It is recommended to cross-reference previously noted information on past orders to point out suspicious discrepancies.

    As Fordham IT can only monitor email addresses and users within our domain, we cannot detect or prevent this activity.

    If your department has been contacted by a vendor reporting this kind of activity, this is the appropriate response:

    We understand that your company has been targeted by a fraudulent company issuing a request for quotation under the false pretense of being a part of Fordham University.  Please note that Fordham University is in no way associated with this request.  We request that your IT department report this email to a spam reporting or blacklisting service such as the Anti-Phishing Working Group:
    https://education.apwg.org/report-cybercrime/

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleFBI Offers Tips for Safe Online Shopping
    Next Article ‘Do not open’: Scam Text Message Poses as Package Tracking Notification, Report Says

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Stay Ahead of Scammers in 2025

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d