Wire Fraud and Business Email Compromise at Canadian Wealth-Management Firms

N/A

HomeIndustriesWealth Management

Wire Fraud and Business Email Compromise at Canadian Wealth-Management Firms

Last updated: May 2026 · Reviewed by Mike Pearlstein, CISSP

The costliest cyber incident at a wealth-management firm is rarely exotic. It is usually a redirected client transfer that started with a compromised or spoofed email. Here is how the attack works and how Canadian advisory firms shut it down.

Talk to Fusion

CISSP-led · Canada’s 50 Best Managed IT (2024 & 2025) · Microsoft Solutions Partner · Canadian-owned, serving regulated SMBs since 2012
Key takeaways

  • Business email compromise redirects client transfers and is among the largest sources of fraud loss for Canadian businesses.
  • The single most effective control is out-of-band callback verification on any change to transfer or banking instructions.
  • Multi-factor authentication and email-impersonation protection close the door the attacker came through.
From the field
Every business email compromise case we have worked started the same way, a real, watched email thread with revised banking details sent at the exact moment of a pending transfer, never a clumsy phishing blast.

How the attack works

In a typical case an attacker gains access to, or convincingly spoofs, an email account involved in a transfer. They watch the conversation, then send revised banking details at the moment a payment is expected. the Canadian Anti-Fraud Centre reports that this pattern, business email compromise, drives some of the largest fraud losses for Canadian organizations.

Advisory firms are exposed because they move client funds on instructions that often arrive by email. The attacker does not need to break encryption. They need to insert one believable message at the right time.

Want this reviewed against your firm’s current setup?

Book a no-obligation review

The controls that stop it

The most effective single control is process: verify any change to transfer or banking instructions by calling the client back on a known number, never a number supplied in the email. This out-of-band callback breaks the attack even if the email is compromised.

Technology closes the entry point. Enforced multi-factor authentication makes a stolen password far less useful, and email-impersonation protection flags spoofed senders and look-alike domains. Staff awareness training keeps the human layer alert to the pattern.

A callback-verification protocol you can adopt this week

Most firms already do callbacks informally. Writing the rule down and making it non-negotiable is what turns a habit into a control an auditor and an insurer will credit. This is the protocol we put in place:

  1. Treat any change to banking or transfer instructions as unverified until a person confirms it.
  2. Call the client back on a number from your own records or CRM, never a number or link supplied in the email.
  3. Read the destination account detail back and have the client confirm it verbally.
  4. Record who verified the change, when, and how, in the client file.
  5. For transfers above a set threshold, require a second staff member to sign off.

The first 60 minutes after a suspected incident

Speed decides whether funds are recovered. A short written plan that names who does each step saves the time that matters most:

  1. Call the receiving bank’s fraud line immediately to attempt a recall.
  2. Report to the Canadian Anti-Fraud Centre.
  3. Preserve the relevant emails, headers, and logs before anything is deleted.
  4. Reset the compromised mailbox password and revoke active sessions and forwarding rules.
  5. Notify the affected client, and assess whether the Office of the Privacy Commissioner of Canada privacy-breach or CIRO reporting duties apply.

A firm that has rehearsed this, even informally, recovers faster and demonstrates the diligence a regulator and an insurer expect.

Frequently asked questions

What is business email compromise?
A fraud where an attacker compromises or spoofs an email account to redirect a payment, typically by sending revised banking details during a real transfer conversation. It is among the largest sources of fraud loss for Canadian businesses.
How do wealth firms prevent fraudulent transfers?
Verify any change to transfer or banking instructions with an out-of-band callback to a known client number. Add enforced multi-factor authentication, email-impersonation protection, and staff awareness training.
What should a firm do if it suspects a fraudulent transfer?
Contact the financial institution immediately to attempt a recall, report to the Canadian Anti-Fraud Centre, and preserve the relevant emails and logs. A written incident plan that names responsibilities speeds this up.
Is Fusion Computing the same as Fusion Cyber Group?
No. Fusion Computing Limited and Fusion Cyber Group (fusioncyber.ca) are separate businesses with similar names. Fusion Computing was founded in 2012 in Toronto and is led by CISSP-certified CEO Mike Pearlstein.

Talk to Fusion about your firm’s security

If your firm wants a security-first managed IT partner that understands CIRO expectations and protects client data, talk to us. We can review your current posture and show where the evidence gaps are.

Book a consultation   or call (416) 566-2845

About the author
Written by Mike Pearlstein, CISSP, founder of Fusion Computing, a Canadian managed IT and cybersecurity provider serving regulated SMBs since 2012.

Regulated industries we secure: law firms · accounting firms · financial services · wealth management · all industries

Related: the CIRO cybersecurity guide for wealth firms · compare IT providers for wealth-management firms · IT and cybersecurity for wealth-management firms.

Fusion Computing has provided managed IT, cybersecurity, and AI consulting to Canadian businesses since 2012. Led by a CISSP-certified team, Fusion supports organizations with 10 to 150 employees from Toronto, Hamilton, and Metro Vancouver.

93% of issues resolved on the first call. Named one of Canada’s 50 Best Managed IT Companies two years running.

100 King Street West, Suite 5700
Toronto, ON M5X 1C7
(416) 566-2845
1 888 541 1611