A Cybercrook, who was a MWh employee in emails, cheated on the city of Portland, Ore. Last March he sent them a payment of the filtration plant of $ 6.7 million.
Money could have been out of reach. But a pay -to -pay platform entangled the Crook, alerting bankers to a possible fraud that he later asked for quick Action of Portland financial managers, avoided a bite loss.
The frustrated Crook even took numerous telephone calls trying to check the payment status.
When criminals supplant someone involved in the payment chain, they often start breaching the safety of e -mail using De disappointments. Cyber criminals have found tempting construction projects and try to induce a general owner or contractor to send payments to a new account number. Once a diverted payment has been made, there is only a short time window when the money can be crossed.
Portland’s payment fraud took place for a five -month interruption in the construction, while city officials were a legal challenge to the project’s environmental permit.
In this case, an employee who worked for a joint company of MWh Builders Inc. and Kiewit Corp. It was impeccable. The joint company is building the huge filtration plant of $ 2.1 billion.
This is followed by how the issue was deployed, according to the affidavit of Michael Porter, the city’s attached prosecutor and other legal documents.
In February, the city implemented a SAP Ariba vendor management system and all its contractors had to use it. Later that month, an email that was depicted as John Lisman, a MWh senior proposal manager, contacted the Portland Accounts Department to request a change in bank account information.
The application email came with all the necessary bank account information, including a Truist Bank account confirmation letter. The city staff sent a security challenge to the joint company address, and when he did not respond, the city did not make changes to the account.
A password reset link request
The criminal, who was still portrayed as Lisman, contacted a member of the city staff, in an email who repeated the request to change the account. The city again informed him that he should make the change in the SAP Ariba system, and the next day, the person who presented himself as Lisman again sent an email saying that something had gone wrong and asked the city to send the password confirmation confirmation link again, to which it seemed to be the same email address.
But the confirmation link did not go to the true John Lisman.
What the city sent allowed the impostor to change the information of the seller’s profile within the SAP Ariba system, including adding a new banking account for pursuit for payments.
Two weeks later, on March 21, the city transferred $ 6.7 million to the account provided by the defrauder, with a settlement date on March 25.
On March 24, the imposter. Sending an email as Lisman, he emaild the payment system by email that the prime contractor’s bank information was incorrect and provided a new account number.
“Based on the research of the city and the law,” said Porter, “I believe [the person portraying Lisman] It may have been aware that Chase Acct. The completion of number 5138 was investigated for use in relation to other transactions and sought to replace another account to divert the transfer “to an account that was not in the radar of the Federal Research Office.
Apparently this last -minute attempt to change the account number disabled a digital alarm. On March 25, Chase contacted Wells Fargo, the city bank, saying that there was a potential fraud associated with the transfer of funds.
________________________________________________________________

________________________________________________________________
With this, the treasurer and attachment of Portland rushed to make measures that could recover the money.
Treasurer Brigid O’Callaghan asked the controller office staff, including Cynthia Dominguez, attached controller of the city, to check the discrepancy of the account information detected by the SAP Ariba and Chase Bank system.
“We have a very brief opportunity to cancel this transaction if this information is not correct,” O’Callaghan wrote in an email at 14:03 that day. Shortly afterwards he sent another email saying “once the funds are sent, it can be very difficult to recover them.”
“Please go ahead and reject payment for now,” Dominguez responded at 15:22.
He followed an investigation and, with the assistance of the FBI, Wells Fargo and Chase, the city learned that the pursuit account with the funds belonged to a law firm in New York City.
But cybercroc couldn’t get the money yet.
From April 2, the criminal presented as Lisman made 10 telephone calls to the Portland Account Payment Department to check the payment status.
On April 4, the city’s water office staff confirmed that John Lisman used by MWh was being prevented.
Believing that the law firm was involved in deception and trying to be sure that the funds could not be removed or used, Portland officials sued legal practice in the New York State Court (and deposited numerous emails showing what happened in the judicial register). But Portland’s legal department soon learned that the law firm had been the target of the cybercard and was not involved in the fraud attempt or in the account established in its name.
On April 23, the city reported that the funds were in the hands of United States Marshalls and that the lawsuit against New York’s law firm had been abandoned.
Portland Mayor Keith Wilson said in a statement that the rapid action of the application of local and federal law stopped the fraudulent transfer “before it landed in the wrong hands.”
“We will continue to collaborate with the application of the law and other partners on the recovery effort and any subsequent persecution and we will take these steps with full responsibility.”
So far no arrests have been made in relation to Portland’s payment fraud.
