NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods
This intelligence analysis examines a widespread Request for Quote (RFQ) scam that exploits Net financing options to steal high-value electronics and goods. The scammers pose as procurement agents for legitimate companies, using stolen information and lookalike domains to appear credible. They request quotes for specific items and inquire about Net 15/30/45-day financing. Once credit is approved, they provide shipping addresses, often using freight forwarding services or residential addresses. The scammers utilize a network of shipping services, warehouses, and money mules to facilitate their operations. Key characteristics of the scam include urgent financing requests, suspicious delivery addresses, and the use of free email accounts. Mitigation efforts included domain takedowns and intercepting fraudulent shipments.
AI Analysis
Technical Summary
The NET RFQ scam is a sophisticated social engineering and business email compromise (BEC) campaign targeting companies that use Request for Quote (RFQ) processes combined with Net financing terms (Net 15/30/45 days). Attackers impersonate legitimate procurement agents by leveraging stolen corporate information and creating lookalike domains to appear credible. They initiate contact by requesting quotes for high-value electronics and other goods, often specifying urgent financing terms to pressure victims. Once the victim approves credit, the scammers provide shipping addresses that are often freight forwarding services or residential locations, enabling them to intercept or divert shipments. The operation is supported by a network of shipping services, warehouses, and money mules to facilitate the movement and monetization of stolen goods. Key indicators include urgent financing requests, suspicious delivery addresses, and the use of free email accounts rather than corporate emails. Mitigation efforts have included domain takedowns and interception of fraudulent shipments. The campaign exploits weaknesses in supply chain procurement processes and financial controls, combining social engineering with logistical fraud to steal physical goods rather than digital assets. This threat aligns with MITRE ATT&CK techniques such as business email compromise (T1566), supply chain compromise (T1583), domain spoofing (T1598), and use of freight forwarding (T1608). The campaign does not rely on software vulnerabilities but on procedural and human factors, making it a complex challenge for organizations relying on RFQ and Net payment terms.
Potential Impact
For European organizations, the impact of this scam can be significant, particularly for companies involved in electronics manufacturing, distribution, and retail sectors that frequently use RFQ processes and Net financing terms. Financially, organizations may suffer direct losses from stolen goods and fraudulent payments. Operational disruptions can occur due to inventory shortages and supply chain delays. Reputational damage is also a concern, especially if customers or partners are indirectly affected by the scam. The use of lookalike domains and stolen corporate information can lead to further phishing or fraud attempts. Additionally, the complexity of the scam involving freight forwarding and money mules complicates recovery efforts and legal recourse. European companies with less mature procurement verification and shipping validation processes are particularly vulnerable. The scam also poses risks to logistics providers and freight forwarders, who may unwittingly facilitate the theft. Overall, the threat undermines trust in supply chain and financing processes, which are critical for European businesses operating in competitive markets.
Mitigation Recommendations
European organizations should implement multi-layered controls to mitigate this threat beyond generic advice. Specific recommendations include: 1) Strengthen procurement verification by validating RFQ requests through direct known contacts rather than relying solely on email communications, especially when financing terms are requested. 2) Implement domain monitoring and alerting to detect lookalike or spoofed domains targeting the company. 3) Enforce strict controls on Net financing approvals, requiring multi-factor authentication and secondary approvals for new or unusual financing requests. 4) Validate shipping addresses rigorously, flagging freight forwarding and residential addresses for additional scrutiny, and coordinate with logistics providers to verify shipment legitimacy. 5) Educate procurement, finance, and logistics teams on the characteristics of this scam, including recognizing urgent financing requests and suspicious email origins. 6) Collaborate with law enforcement and industry groups to report and take down fraudulent domains and intercept shipments. 7) Use email authentication protocols (DMARC, SPF, DKIM) to reduce successful spoofing. 8) Conduct regular audits of RFQ and payment processes to detect anomalies. These targeted measures address the human and procedural weaknesses exploited by the scam.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
Indicators of Compromise
- domain: abec-electricinc.com
- domain: abecelectric.biz
- domain: abecelectric.net
- domain: abecelectric.xyz
- domain: abecelectrical.com
- domain: abecelectrics.com
- domain: abelectriceincs.com
- domain: aceelectricalsinc.com
- domain: advances-electricsinc.com
- domain: americaninstituteresearch.org
- domain: atlanticsdda.com
- domain: azdamiaan-be.com
- domain: bbtruckings.net
- domain: bcciconsts.com
- domain: beauchampcos.com
- domain: citicgroups-hk.com
- domain: cityofchicago-gov.org
- domain: claycorpe.com
- domain: cleanswatersteam.com
- domain: cleanwatersteams.com
- domain: clemsons-edu-school.com
- domain: clemsons-edu-schools.com
- domain: collinsmns.com
- domain: creechlogistic.com
- domain: cummingselecs.com
- domain: delcoelectricsinc.com
- domain: denttoni.com
- domain: dgicomunication.com
- domain: dgicomunications.com
- domain: dropsausas.com
- domain: dvnemail.com
- domain: dvnenergycorp.net
- domain: dvnenergycorp.org
- domain: elllisdoninc.com
- domain: energyelectricneinc.com
- domain: enerveos.com
- domain: faureciausa.com
- domain: fossmaritimes.com
- domain: foxcorporations.net
- domain: gsk-ch.com
- domain: gskpharma.co.uk
- domain: gwelecco.com
- domain: hammondelectrics.com
- domain: hard1nge.com
- domain: hardlnge.com
- domain: hbfullercompany.net
- domain: hearingcomponent.com
- domain: honplumbing.com
- domain: iciconstructionincs.com
- domain: icon-consturction.com
- domain: innovativemedicinejnj.com
- domain: interceptroofiing.com
- domain: interceptrooofing.com
- domain: johnsoncontr0ls.com
- domain: keyeances.com
- domain: konannmedical.com
- domain: labchem-wako-fujifilm.com
- domain: lakeland-gov.net
- domain: lewiisupply.com
- domain: louisvileedu.net
- domain: magnetek-inc.com
- domain: magnetekgroup.com
- domain: magnetekhm.com
- domain: magnetekincs.com
- domain: marrten.net
- domain: mexicanbarrier.com
- domain: mgnetekinc.com
- domain: mtindgovsg.com
- domain: ngbaileys.com
- domain: novartisphamcorp.com
- domain: novartispharmaceuticalscorp.com
- domain: novartispharmcorp.com
- domain: nterceptroofings.com
- domain: omegaengineering-inc.com
- domain: omexom-nz.com
- domain: ourmexicanwall.com
- domain: patmurphyelectrics.com
- domain: portable-air1.net
- domain: quad-graphics.org
- domain: sheppardtruckings.com
- domain: sjdieselservices.com
- domain: smithppi.net
- domain: superiorcranesinc.com
- domain: thedotfunds.org
- domain: thekrogerc.com
- domain: tudisinc.com
- domain: turtlleinc.com
- domain: twc-texas-gov.us
- domain: uk-novartis.com
- domain: volusiacountygov.org
- domain: volusiagov.org
- domain: vseaviations-inc.com
- domain: weikart-ch.com
- domain: willmengconstructions.com
NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods
Description
This intelligence analysis examines a widespread Request for Quote (RFQ) scam that exploits Net financing options to steal high-value electronics and goods. The scammers pose as procurement agents for legitimate companies, using stolen information and lookalike domains to appear credible. They request quotes for specific items and inquire about Net 15/30/45-day financing. Once credit is approved, they provide shipping addresses, often using freight forwarding services or residential addresses. The scammers utilize a network of shipping services, warehouses, and money mules to facilitate their operations. Key characteristics of the scam include urgent financing requests, suspicious delivery addresses, and the use of free email accounts. Mitigation efforts included domain takedowns and intercepting fraudulent shipments.
AI-Powered Analysis
Technical Analysis
The NET RFQ scam is a sophisticated social engineering and business email compromise (BEC) campaign targeting companies that use Request for Quote (RFQ) processes combined with Net financing terms (Net 15/30/45 days). Attackers impersonate legitimate procurement agents by leveraging stolen corporate information and creating lookalike domains to appear credible. They initiate contact by requesting quotes for high-value electronics and other goods, often specifying urgent financing terms to pressure victims. Once the victim approves credit, the scammers provide shipping addresses that are often freight forwarding services or residential locations, enabling them to intercept or divert shipments. The operation is supported by a network of shipping services, warehouses, and money mules to facilitate the movement and monetization of stolen goods. Key indicators include urgent financing requests, suspicious delivery addresses, and the use of free email accounts rather than corporate emails. Mitigation efforts have included domain takedowns and interception of fraudulent shipments. The campaign exploits weaknesses in supply chain procurement processes and financial controls, combining social engineering with logistical fraud to steal physical goods rather than digital assets. This threat aligns with MITRE ATT&CK techniques such as business email compromise (T1566), supply chain compromise (T1583), domain spoofing (T1598), and use of freight forwarding (T1608). The campaign does not rely on software vulnerabilities but on procedural and human factors, making it a complex challenge for organizations relying on RFQ and Net payment terms.
Potential Impact
For European organizations, the impact of this scam can be significant, particularly for companies involved in electronics manufacturing, distribution, and retail sectors that frequently use RFQ processes and Net financing terms. Financially, organizations may suffer direct losses from stolen goods and fraudulent payments. Operational disruptions can occur due to inventory shortages and supply chain delays. Reputational damage is also a concern, especially if customers or partners are indirectly affected by the scam. The use of lookalike domains and stolen corporate information can lead to further phishing or fraud attempts. Additionally, the complexity of the scam involving freight forwarding and money mules complicates recovery efforts and legal recourse. European companies with less mature procurement verification and shipping validation processes are particularly vulnerable. The scam also poses risks to logistics providers and freight forwarders, who may unwittingly facilitate the theft. Overall, the threat undermines trust in supply chain and financing processes, which are critical for European businesses operating in competitive markets.
Mitigation Recommendations
European organizations should implement multi-layered controls to mitigate this threat beyond generic advice. Specific recommendations include: 1) Strengthen procurement verification by validating RFQ requests through direct known contacts rather than relying solely on email communications, especially when financing terms are requested. 2) Implement domain monitoring and alerting to detect lookalike or spoofed domains targeting the company. 3) Enforce strict controls on Net financing approvals, requiring multi-factor authentication and secondary approvals for new or unusual financing requests. 4) Validate shipping addresses rigorously, flagging freight forwarding and residential addresses for additional scrutiny, and coordinate with logistics providers to verify shipment legitimacy. 5) Educate procurement, finance, and logistics teams on the characteristics of this scam, including recognizing urgent financing requests and suspicious email origins. 6) Collaborate with law enforcement and industry groups to report and take down fraudulent domains and intercept shipments. 7) Use email authentication protocols (DMARC, SPF, DKIM) to reduce successful spoofing. 8) Conduct regular audits of RFQ and payment processes to detect anomalies. These targeted measures address the human and procedural weaknesses exploited by the scam.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/net-rfq-request-quote-scammers-casting-wide-net-steal-real-goods"]
- Adversary
- null
- Pulse Id
- 6880970dcf6caa73c7a79b70
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainabec-electricinc.com | — | |
domainabecelectric.biz | — | |
domainabecelectric.net | — | |
domainabecelectric.xyz | — | |
domainabecelectrical.com | — | |
domainabecelectrics.com | — | |
domainabelectriceincs.com | — | |
domainaceelectricalsinc.com | — | |
domainadvances-electricsinc.com | — | |
domainamericaninstituteresearch.org | — | |
domainatlanticsdda.com | — | |
domainazdamiaan-be.com | — | |
domainbbtruckings.net | — | |
domainbcciconsts.com | — | |
domainbeauchampcos.com | — | |
domainciticgroups-hk.com | — | |
domaincityofchicago-gov.org | — | |
domainclaycorpe.com | — | |
domaincleanswatersteam.com | — | |
domaincleanwatersteams.com | — | |
domainclemsons-edu-school.com | — | |
domainclemsons-edu-schools.com | — | |
domaincollinsmns.com | — | |
domaincreechlogistic.com | — | |
domaincummingselecs.com | — | |
domaindelcoelectricsinc.com | — | |
domaindenttoni.com | — | |
domaindgicomunication.com | — | |
domaindgicomunications.com | — | |
domaindropsausas.com | — | |
domaindvnemail.com | — | |
domaindvnenergycorp.net | — | |
domaindvnenergycorp.org | — | |
domainelllisdoninc.com | — | |
domainenergyelectricneinc.com | — | |
domainenerveos.com | — | |
domainfaureciausa.com | — | |
domainfossmaritimes.com | — | |
domainfoxcorporations.net | — | |
domaingsk-ch.com | — | |
domaingskpharma.co.uk | — | |
domaingwelecco.com | — | |
domainhammondelectrics.com | — | |
domainhard1nge.com | — | |
domainhardlnge.com | — | |
domainhbfullercompany.net | — | |
domainhearingcomponent.com | — | |
domainhonplumbing.com | — | |
domainiciconstructionincs.com | — | |
domainicon-consturction.com | — | |
domaininnovativemedicinejnj.com | — | |
domaininterceptroofiing.com | — | |
domaininterceptrooofing.com | — | |
domainjohnsoncontr0ls.com | — | |
domainkeyeances.com | — | |
domainkonannmedical.com | — | |
domainlabchem-wako-fujifilm.com | — | |
domainlakeland-gov.net | — | |
domainlewiisupply.com | — | |
domainlouisvileedu.net | — | |
domainmagnetek-inc.com | — | |
domainmagnetekgroup.com | — | |
domainmagnetekhm.com | — | |
domainmagnetekincs.com | — | |
domainmarrten.net | — | |
domainmexicanbarrier.com | — | |
domainmgnetekinc.com | — | |
domainmtindgovsg.com | — | |
domainngbaileys.com | — | |
domainnovartisphamcorp.com | — | |
domainnovartispharmaceuticalscorp.com | — | |
domainnovartispharmcorp.com | — | |
domainnterceptroofings.com | — | |
domainomegaengineering-inc.com | — | |
domainomexom-nz.com | — | |
domainourmexicanwall.com | — | |
domainpatmurphyelectrics.com | — | |
domainportable-air1.net | — | |
domainquad-graphics.org | — | |
domainsheppardtruckings.com | — | |
domainsjdieselservices.com | — | |
domainsmithppi.net | — | |
domainsuperiorcranesinc.com | — | |
domainthedotfunds.org | — | |
domainthekrogerc.com | — | |
domaintudisinc.com | — | |
domainturtlleinc.com | — | |
domaintwc-texas-gov.us | — | |
domainuk-novartis.com | — | |
domainvolusiacountygov.org | — | |
domainvolusiagov.org | — | |
domainvseaviations-inc.com | — | |
domainweikart-ch.com | — | |
domainwillmengconstructions.com | — |
Threat ID: 6880a8b8ad5a09ad0023246d
Added to database: 7/23/2025, 9:17:44 AM
Last enriched: 7/23/2025, 9:34:08 AM
Last updated: 7/24/2025, 12:32:36 AM
Views: 4
Related Threats
Gunra Ransomware Emerges with New DLS
MediumAI-Generated Malware in Panda Image Hides Persistent Linux Threat
MediumA Special Mission to Nowhere
MediumOperation Cargotalon: Targeting Russian Aerospace Defense Using Eaglet Implant
MediumIllusory Wishes: China-nexus APT Targets the Tibetan Community
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.