The $500 Gift Card That Nearly Cost Millions: Understanding Executive Email Spoofing
By Andrew Johnston | 27 January 2026
Summary
A seemingly harmless email request from the CEO asking a new employee to purchase gift cards led to a serious security incident. This real-world case study shows how preventable failures and weak email security controls can result in significant financial and reputational damage, underscoring the critical importance of robust email security in modern organisations.

When a Simple Request Becomes a Security Catastrophe
Imagine starting your new job, eager to impress the senior leadership team you've just met during your induction. An email arrives from the CEO requesting your help with a simple task, purchasing $500 in gift cards for an urgent staff recognition initiative. What could go wrong?
This scenario isn't hypothetical. It's a true case study from a technology company that demonstrates how a cascade of preventable failures can expose organisations to significant financial and reputational harm. More importantly, it highlights why email security cannot be an afterthought in today's threat landscape.
The Anatomy of a Preventable Breach - The Sequence of Failures
Failure One: Lack of Verification
A newly inducted staff member received an email apparently from the CEO, requesting the purchase of gift cards. Despite having only recently met the executives, the employee did not question why a more senior staff member in the office had not been selected to carry out the task. In environments lacking established security awareness, the desire to appear helpful to senior leadership often overrides critical thinking.
Failure Two: Inadequate Financial Controls
The staff member approached the CFO to ask how to purchase the requested gift cards. Rather than questioning the unusual request or verifying its legitimacy, the CFO provided the employee with a company credit card. This represents a critical breakdown in financial governance and authorisation processes.
Failure Three: Compromising Payment Credentials
The employee then emailed the gift card details, including PIN numbers, to the fraudulent email address. At no point did the employee question why the CEO would ask them to purchase the gift cards rather than using the corporate company credit card. The company’s credit card credentials were now in the hands of criminals.
The Root Cause: Systemic Security Deficiency
This incident was not caused by sophisticated hacking or advanced persistent threats. It resulted from fundamental gaps in organisational security posture:
- No dedicated security oversight (CISO, IT Security Manager, or equivalent role)
- Absence of security policies and procedures
- No cybersecurity awareness programme during induction or ongoing training
- Limited technical controls beyond basic firewalls
- Lack of email authentication mechanisms
- No verification procedures for unusual financial requests
The organisation operated under the dangerous assumption that "we have firewalls, so everything is fine, a mindset that leaves significant attack surfaces completely unprotected.
Understanding the Threat Landscape
Types of Email-Based Attacks
1. Phishing: The Scatter-Gun Approach
Phishing campaigns cast a wide net, sending fraudulent emails to large numbers of recipients simultaneously. These emails typically impersonate:
- Banking institutions
- Credit card providers
- Emergency services
- Taxation authorities (such as Inland Revenue)
- Vehicle reregistration authorities
- Technology service providers such as Norton, McAfee, Microsoft etc
- Company executives
The strategy relies on volume – even if only 1-2% of recipients fall victim, the campaign can be highly profitable for attackers. These emails often feature:
- Legitimate-looking logos and branding
- Urgent calls to action ("Your account will be suspended")
- Links to convincing replica websites
- Requests for credential verification
- Refunds and Subscription renewal
2. Spear Phishing: The Targeted Strike
Spear phishing represents a more sophisticated approach where attackers research their targets. Using information learned from:
- Company websites and staff directories
- LinkedIn and professional networking sites
- Social media profiles
- Previous data breaches
- Public business records
Attackers craft highly personalised messages that reference:
- Specific projects or initiatives
- Colleague names and relationships
- Recent company events or changes
- Industry-specific terminology
This personalisation significantly increases the success rate, as emails appear genuinely relevant to the recipient's role and context.
3. Business Email Compromise (BEC): The Executive Impersonation
BEC attacks specifically target business environments by impersonating executives or trusted business partners. The FBI's Internet Crime Complaint Centre consistently ranks BEC among the most financially damaging cybercrimes, with global losses exceeding billions of dollars annually.
Common BEC scenarios include:
- CEO requesting urgent wire transfers
- CFO authorising payment to new vendor accounts
- HR requesting employee personal information updates
- Executive requesting gift card purchases (as in our case study)
Red Flags: Identifying Fraudulent Emails
Even sophisticated attacks often contain telltale signs:
- Inconsistent sentence structure
- Grammatical errors unusual for the purported sender
- Spelling mistakes (particularly in sender names or company terms)
- Unusual formatting or fonts
- Lack of email signature or incorrect signature format
Technical Indicators:
- Domain mismatches: The text after the "@" symbol does not match official company domains
- Free email services: Executives using Gmail, Hotmail, Outlook.com, or Yahoo for business communications
- Display name spoofing: The displayed name appears correct, but the actual email address is different
- Suspicious reply-to addresses: Response emails directed to addresses different from the sender
Contextual Anomalies:
- Unusual urgency or secrecy
- Requests that bypass normal procedures
- Financial transactions outside established workflows
- Requests for personal information already held by the organisation
- Communication via unusual channels (e.g., executive suddenly using personal email)
The Technical Exploitation: How Attackers Make It Look Real
SMTP Open Relay: The Forgotten Vulnerability
One of the most dangerous technical oversights enabling email spoofing is the SMTP Open Relay. Understanding this vulnerability requires understanding how email systems work.
What is SMTP?
Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the internet. SMTP servers are responsible for routing email from sender to recipient. Under normal, secure configuration, an SMTP server should only accept and relay emails from authenticated users or trusted systems.
The Open Relay Problem
An SMTP Open Relay occurs when an email server is configured to accept and forward emails from any source to any destination without authentication. This means:
- Anyone can use the server to send emails
- No credentials are required to relay messages
- The emails appear to originate from the organisation's legitimate domain
- Standard security controls may not flag these emails as suspicious
Why This Matters for Email Spoofing?
When an organisation has an improperly configured SMTP server, attackers can:
- Send emails that genuinely originate from the company's mail infrastructure
- Bypass basic email authentication checks
- Create emails that pass spam filters
- Make the "From" address completely legitimate at the technical level
In our case study, if the technology company had an SMTP Open Relay vulnerability, the fraudulent CEO email could have come through their own mail servers, making it technically indistinguishable from legitimate internal communications.
How Attackers Discover Open Relays
Cybercriminals use automated tools to scan the internet for mail servers, testing whether they accept unauthenticated relay requests. Once identified, these servers may be:
- Added to databases shared among criminal networks
- Used repeatedly for various fraud campaigns
- Exploited until the vulnerability is remediated
Email Authentication Failures: The Missing Safety Net
SPF (Sender Policy Framework) Deficiencies
SPF is a DNS-based authentication mechanism that specifies which mail servers are authorised to send email on behalf of a domain. Without proper SPF records:
- Recipients cannot verify whether an email genuinely came from your domain
- Attackers can easily spoof your domain to target your own staff or customers
- Legitimate emails may be marked as spam while fraudulent ones pass through
Conclusion: From Vulnerability to Vigilance
The $500 gift card incident could have resulted in far greater losses, potentially exposing the organisation to ongoing fraud, data breaches, or regulatory consequences. It serves as a stark reminder that email security is not merely a technical problem requiring technical solutions, but an organisational challenge demanding attention across people, processes, and technology.
New Zealand organisations face the same email-based threats as their international counterparts, but often with smaller security teams and more limited resources. This makes it even more critical to implement layered defences, foster security-aware cultures, and engage with local security expertise when needed.
The good news? Email security does not require unlimited budgets or large security teams. It requires commitment from leadership, basic technical hygiene, clear policies and procedures, and staff who understand the threats and know how to respond.
Do not wait for a major financial incident, it is a costly mistake. By the time the problem is recognised, the damage may already be done
Need Help Securing Your Email Environment?
At Liverton Security, we help organisations build robust defences against email-based threats. Our services include:
- Email security applications, MailAdviser and SmartGate, provide warnings and checks aligned with business best practices and customised for your business.
- LiveDMARC email policy definition verifying the sender authenticity and reporting tools.
- Email security assessments identifying vulnerabilities like SMTP Open Relay and authentication gaps
- Security awareness training tailored to your organisations
- Policy and procedure development aligned with NZISM, PSR, and international standards
- Incident response planning for email compromise scenarios
- Ongoing security advisory services for SMBs and local government
Contact Liverton Security for a confidential conversation about your email security posture and practical steps to strengthen your security defences.
About Liverton Security
Digital technology has greatly expanded opportunities for businesses, but has also introduced complex security threats that organisations cannot ignore. Protecting people, critical data, and entire organisations requires proactive and continuous security strategies.
As an influential and respected leader in global cybersecurity, Liverton Security specialises in helping businesses and government organisations neutralise evolving cyber threats in the digital age.
Can we help keep you cyber safe?
To explore solutions and discuss your cybersecurity needs, talk to our team at Liverton Security.
Let's Chat