From startups to legacy brands, you're making your mark. We're here to help.
Key Links
Prepare for future growth with customized loan services, succession planning and capital for business equipment.
Key Links
Serving the world's largest corporate clients and institutional investors, we support the entire investment cycle with market-leading research, analytics, execution and investor services.
Key Links
Providing investment banking solutions, including mergers and acquisitions, capital raising and risk management, for a broad range of corporations, institutions and governments.
Your partner for commerce, receivables, cross-currency, working capital, blockchain, liquidity and more.
Key Links
A uniquely elevated private banking experience shaped around you.
Whether you want to invest on your own or work with an advisor to design a personalized investment strategy, we have opportunities for every investor.
For Companies and Institutions
From startups to legacy brands, you're making your mark. We're here to help.
Serving the world's largest corporate clients and institutional investors, we support the entire investment cycle with market-leading research, analytics, execution and investor services.
Your partner for commerce, receivables, cross-currency, working capital, blockchain, liquidity and more.
Prepare for future growth with customized loan services, succession planning and capital for business equipment.
Providing investment banking solutions, including mergers and acquisitions, capital raising and risk management, for a broad range of corporations, institutions and governments.
For Individuals
A uniquely elevated private banking experience shaped around you.
Whether you want to invest on you own or work with an advisor to design a personalized investment strategy, we have opportunities for every investor.
Explore a variety of insights.
Key Links
Insights by Topic
Explore a variety of insights organized by different topics.
Key Links
Insights by Type
Explore a variety of insights organized by different types of content and media.
Key Links
We aim to be the most respected financial services firm in the world, serving corporations and individuals in more than 100 countries.
Key Links
All organizations rely on business email in some way, but its popularity and ease of use also makes it a target for cybercriminals, who may use tactics like look-alike and domain spoofing.
Look-alike domains and email spoofing attempt to visually trick victims into thinking an email originated from a legitimate sender, when it actually came from a criminal with an email address that looks similar or is forged. Both schemes are used in phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust. This is done to manipulate your employees or business partners into divulging confidential information or redirecting payments. This scheme is commonly known as email spoofing and is a form of phishing attack meant to manipulate your employees or business partners into divulging confidential information or redirecting payments.
Look-alike domains are a cyber risk for companies of all industries and sizes. The following information and best practices are meant to help your business implement look-alike domain and email spoofing prevention policies and controls.
Below are some common ways that criminals construct look-alike domains. Can you spot the differences?
Tactic | Real | Look-alike domain |
---|---|---|
Removing a character from the domain | @marquettefarm.com | @marquetefarm.com |
Changing the top-level domain | @marquettefarm.com | @marquettefarm.co |
Changing a character in the domain | @marquettefarm.com | @marguettefarm.com |
Adding a character in the domain | @marquettefarm.com | @marquettefarms.com |
Successful domain spoofing attempts depend on the recipient being distracted or rushed. It can be very easy to mistake an “rn” for an “m.” Protecting against email domain spoofing requires vigilance and a critical approach to verifying that messages come from authentic sources.
Being prepared for domain phishing attacks requires a multilayered approach. Protecting your business, your clients and your employees can be achieved through a combination of strong internal controls and employee education, including:
Teach employees to never trust email for payment instructions and to always validate payment-related requests by doing a callback to the actual person making the request using a trusted phone number obtained from a system of record.
These additional tips can help you mitigate spoofing risks, or help you recover from a suspected attack:
JPMorgan Chase is continually investing in our fraud prevention tools and capabilities to protect both our firm and your business. If you believe you’ve been the target of a domain spoofing scam, talk to your relationship team immediately.
You can also access our guide to business email compromise to learn more about email spoofing prevention.
Cybersecurity
Your house may be spying on you. Save yourself.
Nov 15, 2024
All the smart devices embedded in our homes can put us at risk. Discover how to secure your IoT devices, and what you can do to protect yourself.
Cybersecurity
5 ways to boost your kids’ fraud prevention savvy
Oct 23, 2024
With the increasing complexity of fraud schemes, it’s important your kids understand how to keep their accounts and personal information safe.
Cybersecurity
Mind your business: How to keep your company cyber secure
Sep 05, 2024
Does your business’ cybersecurity need some TLC? With cybercrime on the rise, it’s important to understand how you can keep your business accounts and assets well protected.
Cybersecurity
Rise of the AI chatbots: More data. Greater danger.
May 08, 2024
Easy-to-use artificial intelligence tools may soon change our work and school lives. But they come with a host of new privacy threats. Here are some ways to help protect yourself.
Cybersecurity
How small and midsize businesses can fight fraud with limited resources
Apr 26, 2024
Small and midsize companies are just as vulnerable to schemes like business email compromise, wire fraud and insider payments fraud.
Cybersecurity
4 callback do’s and don’ts to protect against BEC
Sep 28, 2023
Callbacks are essential to rooting out payments fraud. But this validation process can still go wrong. Here’s what to do—and what not to do.
Cybersecurity
It’s back-to-school season: Are you cyber prepared?
Aug 30, 2023
With a new school year on the horizon, now is a great time to make sure your family is staying as safe as possible online.
Fraud
Report: Most companies will experience fraud
May 26, 2023
The 2023 AFP Payments Fraud and Control Report shows fraud remains a serious matter for virtually every business. Register now for our upcoming webinar to learn more about the report—and how to protect your organization.
You're now leaving J.P. Morgan
J.P. Morgan’s website and/or mobile terms, privacy and security policies don’t apply to the site or app you're about to visit. Please review its terms, privacy and security policies to see how they apply to you. J.P. Morgan isn’t responsible for (and doesn’t provide) any products, services or content at this third-party site or app, except for products and services that explicitly carry the J.P. Morgan name.