Close X
Attorney Spotlight

Find out which two countries Cheryl Palmeri gets the most questions about related to International Trade in today's market? Find out more>


Close X


Search our Experience

Experience Spotlight

In June 2016, AmSurg Corp. and Envision Healthcare Holdings, Inc. (Envision) announced they have signed a definitive merger agreement pursuant to which the companies will combine in an all-stock transaction. Upon completion of the merger, which is expected to be tax-free to the shareholders of both organizations, the combined company will be named Envision Healthcare Corporation and co-headquartered in Nashville, Tennessee and Greenwood Village, Colorado. The company's common stock is expected to trade on the New York Stock Exchange under the ticker symbol: EVHC. Bass, Berry & Sims served as lead counsel on the transaction, led by Jim Jenkins. Read more.

AmSurg logo

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Inside the FCA blogInside the FCA blog features ongoing updates related to the False Claims Act (FCA), including insight on the latest legal decisions, regulatory developments and FCA settlements. The blog provides timely updates for corporate boards, directors, compliance managers, general counsel and other parties interested in the organizational impact and legal developments stemming from issues potentially giving rise to FCA liability.

Read More >

Look-Alike Email Scam Targets Businesses


February 4, 2015

As businesses strengthen data security protocols to protect against phishing, hacking strategies are evolving and becoming increasingly clever. Look-alike email scams are an emerging strategy used by hackers to deceive even sophisticated businesses. A particularly ingenious scam now circulating heightens the importance of educating C-suite and other key company personnel, especially those with financial responsibility, of the need for scrutiny of any directive that would result in the transfer of company assets.

Unlike more easily-detected phishing emails from suspicious outside addresses, look-alike email scams operate through actual email addresses which appear to come from a source within an organization. A recent ruse involves impersonating legitimate company personnel, then using fictitious internal communications to cause other company personnel to transfer funds. Hackers register available top-level domain names with a nearly-imperceptible variation of the company's actual domain name, which can easily trick the eye of a busy corporate officer, particularly in a fast-paced working environment involving a high daily volume of emails.

In the latest look-alike email scam, hackers diligently research the names and job positions of actual corporate officers within the target company, particularly those high-ranking executives with authority to transfer funds. Armed with this data, hackers set up look-alike email addresses using the names of real employees, then send communications from the look-alike email addresses to actual employee email addresses requesting transfer of funds. This hoax is particularly effective when a fictitious internal communication exchange is incorporated into the ultimate funds transfer email.

For example, the actual email address of the CEO of ABC, Inc. is "", and the actual email address of the CFO of ABC, Inc. is "". A hacker registers the look-alike email addresses "" and "". An actual email directing a funds transfer is sent from fictitious CEO "" to fictitious CFO "". The email is then forwarded from the fictitious CFO to an actual employee in the ABC, Inc. accounting department, requesting or approving the monetary transaction listed in the CEO/CFO email. Look-alike email scams are difficult to detect due to the use of supposed email exchanges between known co-workers suggesting legitimacy and credibility. This is especially so when the spoof email addresses are created by substituting or adding certain letters, such as replacing the two L's in "" with three L's (""). Awareness and prevention of this type of hacking is crucial in the corporate context.

Our experienced Data Security & Privacy team offers evaluation, monitoring and registration services to help protect against these types of look-alike scams, and other data security risks.

Related Professionals

Related Services


Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.