family office security 4 min read | Invalid Date | HD Intelligence Desk

The Invoice That Came From Inside the House

A family office wired $2.3M to fraudsters who knew everything — the principal's travel, his assistant's name, even the art dealer's banking details. Here's what they missed.

family office fraud prevention social engineering family office UHNW digital exposure family office due diligence wealth management security
a computer circuit board with a brain on it

Photo by Steve A Johnson on Unsplash

The email arrived at 4:47 PM on a Thursday, which was exactly when Marcus Chen’s guard was lowest. His principal was wheels-up to Geneva in fourteen hours for the closing. The gallery’s wire instructions were attached, just as expected. Three days later, Marcus would be explaining to his principal why $2.3 million was gone and why no one at Galerie Beaumont had ever sent that email.

What Does a Family Office Security Risk Look Like in Practice?

A family office security risk rarely announces itself. It accumulates quietly in the spaces between what the office controls and what it assumes is private.

Marcus ran a single-family office in Dallas managing $340 million for a second-generation wealth holder whose interests included contemporary art. The relationship with Galerie Beaumont in Geneva stretched back four years — three prior acquisitions, consistent communications, familiar names on both sides. When the principal decided to acquire a $2.3 million piece, the process looked routine. Term sheet signed in January. Closing scheduled for late March. The principal would fly over for the handoff.

The wire instructions that landed in Marcus’s inbox that Thursday afternoon matched everything he’d seen before. Same contact name at the gallery. Same formatting. Same bank in Zurich. The only difference was that someone else had written it.

How Did Fraudsters Know Enough to Execute This Attack?

The fraudsters had spent months building an intelligence file that would have impressed a due diligence firm — because the family office had, unknowingly, published most of it themselves.

Three months earlier, the principal’s executive assistant had posted about accompanying him to Art Basel Miami. The photos showed them at Galerie Beaumont’s booth, the principal shaking hands with the gallery director. That single post established the relationship and suggested active collecting interests.

The principal’s travel patterns were visible through a combination of sources. His Gulfstream’s tail number was publicly registered, and flight tracking services — marketed to aviation enthusiasts but used by investigators and criminals alike — showed where he’d been and when. Family members’ Instagram posts filled in the gaps: ski trips to Gstaad in February, a grandson’s lacrosse tournament in Greenwich in March.

The fraudsters knew the Geneva trip was coming before Marcus had finalized the wire instructions. They knew because the family had told them.

Meanwhile, the gallery itself had been compromised. A credential phishing attack against Galerie Beaumont’s administrative staff, likely in late 2024, gave the attackers access to the gallery’s email archive. They read every exchange about the pending acquisition. They knew the amount. They knew the timing. They knew which family office contact would receive the wire instructions.

When they were ready, they registered galerie-beamont.ch — one letter off from the real domain — and sent Marcus an email that looked exactly like every legitimate message he’d received from Geneva.

Why Did the Family Office Fraud Prevention Protocols Fail?

The failure wasn’t technical. It was procedural and cognitive, one missed check compounding another until the wire cleared.

The family office email domain had no DMARC enforcement, the email authentication protocol that would have flagged the spoofed domain as suspicious. Messages from galerie-beamont.ch passed the inbox’s spam filters and landed where Marcus expected them.

Under deadline pressure — the principal was traveling, the closing was imminent, the gallery was waiting — Marcus followed his verification protocol. He called to confirm the wire instructions. But he dialed the phone number listed in the email he’d just received, not the number on the gallery’s website or in the family office’s vendor database. A woman answered, confirmed the instructions, thanked him for his promptness.

The $2.3 million cleared to an account in Hong Kong. Within eighteen hours, the funds had moved through Singapore, then to a shell company in the UAE, then vanished. By the time the real Galerie Beaumont called asking about the delayed payment, recovery was mathematically impossible.

What Should Proper UHNW Digital Exposure Assessment Have Caught?

turned on monitoring screen Photo by Stephen Dawson on Unsplash

A family office operating with adequate threat intelligence would have known three things before this transaction ever began.

First, a digital exposure assessment would have flagged that the principal’s travel patterns were reconstructible from open sources. The jet registration, the family’s social media, the assistant’s LinkedIn activity — taken together, these created a targeting profile. Anyone motivated to build a file on the principal could have built one. The family office would have had the opportunity to implement operational security measures: tightening social media policies, using aircraft management structures that obscure ownership, briefing family members on what not to share.

Second, email infrastructure hardening would have included DMARC, DKIM, and SPF enforcement alongside executive impersonation monitoring. Emails from lookalike domains would have been quarantined or flagged before reaching inboxes. The family office would have received alerts when anyone registered domains similar to their own or to their key vendors.

Third, wire verification protocols would have required out-of-band confirmation using contact information sourced independently from any email chain. The gallery’s real phone number was on their website. It was in the family office’s vendor file. A callback to either would have broken the fraud chain in under two minutes.

None of these controls are exotic. Each is well-documented in FBI guidance on business email compromise. The problem was that no one had connected the exposure indicators to the transaction protocols. The family office was securing individual processes without seeing how an adversary might chain them together.

What Are the Key Takeaways From This Wealth Management Security Failure?

  • Digital exposure compounds: travel patterns, social media, vendor relationships, and email security are not separate risk categories — adversaries combine them into targeting packages
  • Verification protocols fail when they rely on attacker-controlled information; callback numbers must be independently sourced
  • Family offices managing substantial assets are high-value targets precisely because they combine significant capital with thin operational security teams
  • The reconnaissance investment that enables these attacks is minimal compared to the potential return; a few weeks of monitoring can yield seven-figure payouts
  • Seeing your principal’s digital footprint the way an adversary sees it is prerequisite to defending it

What Is the Operational Lesson for Family Office Due Diligence?

Fraudsters don’t need to hack your systems when they can read your patterns. Every piece of digital exhaust — a travel photo, a jet registration lookup, an assistant’s professional update — becomes reconnaissance material.

The question isn’t whether someone is building a file on your principal. The question is whether you’ve seen it first.

Marcus Chen followed his procedures. He verified. He called. He checked the wire instructions against his memory of prior transactions. He did everything he was supposed to do except step outside the attacker’s frame. The fraudsters knew his verification would come. They’d read his prior emails. They knew he’d call. So they gave him a number to call.

Family offices are not banks. They don’t have compliance departments or fraud investigation units. But they manage assets that make them worth months of patient reconnaissance by sophisticated criminal networks operating across multiple jurisdictions. The mismatch between threat exposure and defensive resources is the vulnerability itself.

The fix is not paranoia. The fix is seeing what adversaries see before they act on it.

Begin a Confidential Conversation