Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Insider Threat Fraudulent Invoicing & Shell Company Schemes Report

Contact Information
Jim Henderson, CISSP, CCISO
Founder / Chairman Of The National Insider Threat Special Interest Group
Insider Threat Researcher / Speaker
FBI InfraGard Member
[email protected]
www.nationalinsiderthreatsig.org
561-809-6800

FOR IMMEDIATE RELEASE

INSIDER THREAT FRAUDULENT INVOICES – SHELL COMPANY SCHEMES REPORT
August 2025
Produced By:
National Insider Threat Special Interest Group (NITSIG)
Insider Threat Defense Group

West Palm Beach, Florida, August 14, 2025 — The unique report will highlight employees that are involved in 1) Creating fraudulent invoices (For Products, Services And Vendors That Don’t Exist) 2) Manipulating legitimate invoices 3) Working with external co-conspirators / vendors to create fraudulent or manipulated invoices. (See Page: 6-24)

These fraudulent invoices will then be submitted to the employer for payments to a shell company created by the employee, who will receive payment to a shell company bank account or through other methods. These fraudulent invoices schemes may happen just once or become reoccurring.

Employees may also collaborate with other employees, vendors or third parties to approve fraudulent invoices in exchange for kickbacks. An accounts payable employee might work with a vendor to create fraudulent invoices, and then the employee ensures the invoices are approved. Then the employee and vendor share the proceeds after the payment is issued.

These schemes can be disguised as legitimate business transactions, making them difficult to detect without proper internal controls. A shell company often consists of little more than a post office box and a bank account.

According to the Association of Certified Fraud Examiners 2024 Report, more than half of frauds occurred due to lack of internal controls or an override of existing internal controls.

These schemes are often perpetrated by an opportunist employee, whose primarily focuses is for their own self-interest. They take advantage of opportunities (Lack Of Controls, Vulnerabilities) within an organization, often with little regard for the ethics, consequences or impacts to their employers. They are driven by a desire to maximize their personal financial gain.

From small companies to Fortune 500 companies, this report will provide a snapshot of fraudulent invoicing and shell companies schemes that are quite common.

This report and other monthly reports produced by the NITSIG provide clear and indisputable evidence of how very costly and damaging Insider Threat incidents can be to organizations of all types and sizes. In some cases companies have also had large layoffs or gone out of business.

Download Report / No Registration Required
https://nationalinsiderthreatsig.org/pdfs/insider-threat-incidents-report-fraudulent-invoices-shell-company-schemes%208-10-25.pdf

If you would like to receive the monthly Insider Threat Incidents Reports, please send an e-mail to: [email protected] to be added to the distribution list.

INSIDER RISK MANAGEMENT PROGRAM TRAINING COURSES
Offered By: Insider Threat Defense Group, Inc. (ITDG)

Is your organization looking to develop or enhance and optimize an Insider Risk Management (IRM) Program?

What Makes ITDG Training Courses Unique And Differentiates Us From Other IRM Program Training Providers?
The ITDG uses a very comprehensive holistic / 360 degree approach that goes beyond just treating Insider Threats as a data security, employee monitoring, technical, cyber security, counterintelligence or investigations problem.

Our training courses are taught from a real world, practical and operational perspective. They focus on the Insider Threat problem from not just a DETECTION perspective, but from a PROACTIVE perspective. This approach will provide all individuals managing or supporting an IRM Program, with a much deeper understanding of the collaboration and responsibilities required by key stakeholders, and the many underlying and interconnected components that are essential for a comprehensive program. This will ensure the Insider Risk Program Manager and all stakeholders are UNIVERSALLY ALIGNED from an enterprise / holistic perspective to detect, investigate, prevent and mitigate employee risks / threats. The ITDG is so confident about our training courses that they come with a MONEY BACK GUARANTEE.

Our student satisfaction levels are in the EXCEPTIONAL range. We encourage you to read the feedback from our students on the course registration links below.

IRM Program Evaluation & Optimization Training Course ***
Airbus U.S Space & Defense / NASA Kennedy Space Center Florida
September 15-16, 2025

Insider Threat Investigations & Analysis Training Course With Legal Guidance From Attorney
October 1-2, 2025 (Classroom – Virtual)
Johns Hopkins University Applied Physics Laboratory, Laurel, Maryland

IRM Program Evaluation & Optimization Training Course ***
University El Paso, Texas
October 27-28, 2025

Complete Details / Registration Located Under Upcoming Training Classes
*** Special Pricing For Insider Threat Awareness Month (September)
https://www.insiderthreatdefense.us/insider-threat-defense-group-training/

Please contact me if you have any questions about this report or the training courses.

Jim Henderson
CEO Insider Threat Defense Group, Inc.
Insider Risk Management Program Training Course Instructor / Consultant
Insider Threat Investigations & Analysis Training Course Instructor / Analyst
Insider Risk / Threat Vulnerability Assessor
[email protected]
www.insiderthreatdefensegroup.com

Press Release by National Insider Threat Special Interest Group

Media Contact

JIm Henderson


Download Cyber Defense Magazine September Edition
for 2025


Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.