This week, the Proofpoint email security platform we deploy for our clients quarantined an outgoing message from one of those clients — an executive assistant about to wire payment for a conference attendee list. The system flagged it as fraud with Very High confidence, citing imposter and impersonation signals, and held the message before it could leave the network. By the time we finished verifying the thread, it was clear that the entire conversation, going back nearly three weeks, was a scam. No money moved. No data was lost. But the case is a textbook example of an attack we've been seeing more and more, and we think it's worth breaking down publicly so other businesses can recognize it.
Our client's CEO had recently engaged with a professional conference. A few days after the engagement, an email arrived from someone claiming to work for the conference, asking whether he'd like the attendee list. He said yes. Within a few hours, a "vendor" jumped into the thread offering the list for sale at two price tiers — $650 or $700. The pricing felt reasonable. The branding was clean. The vendor sent a purchase order, the client signed it, an invoice came back, and three weeks later the executive assistant was preparing to send payment by check or wire.
That's when Proofpoint flagged the outbound message and held it. What we found, once we dug in, was that nothing about the conversation was real.
This pattern has a name in the events industry: the conference attendee list scam. It runs on a predictable script:
Legitimate conferences do not sell their attendee lists this way. They never authorize unsolicited third parties to do it on their behalf.
Every scam of this type leaves the same fingerprints. In this case:
If you get an email offering to sell you a conference attendee list, treat it as fraudulent until proven otherwise.
Move fast. Time matters.
It's worth being clear about what actually saved this client: the Proofpoint email security platform we deploy as part of our managed security stack. The scammer wrote a convincing thread. The pricing was modest. The pacing felt normal. Three weeks of back-and-forth had built up enough familiarity that the client team had no reason to suspect anything by the time payment was being prepared.
What broke the chain was Proofpoint's classification engine reading the outbound reply and scoring it Very High on imposter and impersonation indicators — based not on the content of the message itself, but on the combination of fresh look-alike domains, mismatched entity identities in the thread, and financial language. That signal is what gave us the time to investigate before money moved.
Email security tools sometimes get a bad reputation because most of what they do is invisible — until the day they catch the one message that would have cost you. This was that day. We deploy Proofpoint for our managed clients precisely because this category of fraud doesn't look like fraud to a human reader anymore, and a properly tuned filter sees patterns that even experienced staff will miss.
This is one of a family of business email compromise scams that target finance and operations staff at small and mid-sized businesses. The dollar amounts are kept small — $500 to $2,000 — because that's below most internal approval thresholds and rarely triggers a second look. Multiplied across thousands of targeted businesses, it's a profitable operation.
The defense is straightforward but requires discipline: verify out of band, never trust a thread without confirming both endpoints, and treat any unfamiliar address copied into a financial conversation as suspicious until proven otherwise.
If your business attends or exhibits at industry conferences, your team should know what this scam looks like before it shows up in their inbox.
Boston Managed IT is a Boston-based managed services provider helping growing businesses stay secure, productive, and well-supported. If you'd like to talk about your organization's email security posture, book a call or reach us at (800) 899-3195.