.jpg?width=1024&height=576&name=bilde%20(1).jpg)
It started as a completely ordinary afternoon. The time was approaching 5 PM. Meetings were done. Thoughts were already drifting toward other things.
Then the phone rang. A board member answered.
“Hello, this is Pedersen from the auditing firm.”
The voice was calm. Professional. Slightly rushed. He explained that since the company had recently registered a relocation of its headquarters, a few formal registrations still needed to be completed. He was working late. He really just wanted to finish up and get home.
There was a slight sense of urgency. But not enough to seem suspicious.
Pedersen knew who sat on the board, who the chairperson was, and who the company auditor was. He knew about the relocation. He referred to other board members by name. They had not had time to sign yet, he said. Could you help?
This is the core of modern fraud. It is not obviously wrong. It is almost correct. Almost professional. Almost completely believable. And that is exactly what makes it dangerous.
The company had done something entirely normal: registered a relocation of its headquarters with the Norwegian Register of Business Enterprises. Public information, available to anyone.
And someone was paying attention.
Fraudsters do not monitor your business, they monitor your events.
As soon as the registration was submitted, the work began: mapping the board, gathering phone numbers, identifying the auditor, and preparing a believable story. This was not random. It was targeted.
The calls came around 5 PM. When people are tired, mentally moving on with their day, and less alert than they believe they are.
The best attacks do not happen because people lack competence. They happen because people are under time pressure.
Pedersen was polite. But also slightly insistent. After all, he was working overtime. He just wanted to finish. Couldn’t they simply sign quickly?
Then came the request. A digital signature. A BankID request.
Several board members received the same call. Everyone reacted slightly, something felt off. But not enough for anyone to raise the alarm. Most said they did not have time. Some redirected him elsewhere. Then the signing request arrived anyway. It came very close.
Not technology. Not security systems.
Coincidence, and communication. The request came from the wrong bank. Nobody approved it. And most importantly: the board members started talking to each other. Shared reflection stopped what individual skepticism alone could not.
Individual skepticism is good. Shared situational awareness is better.
Afterwards, one thing became clear: this could have ended very badly. The board therefore introduced a few simple but effective measures:
This is not an IT problem. It is a board level responsibility. The attacks do not primarily target your infrastructure, they target your decisions. With regulations such as the Digital Security Act and NIS2, boards are expected to understand this risk, take active measures, and help build a culture where security is everyone’s responsibility, not just IT’s.
This was not an advanced technical operation. It was good research, perfect timing, psychological pressure, and a believable story. That was almost enough. And perhaps that is the most disturbing part of all.
You do not need to be careless to be deceived. You only need to be a little busy.
Would you like to know how prepared your organization is against attacks like this? Reach out for a no obligation conversation.
%20(1)-1.png?width=292&height=365&name=ChatGPT%20Image%208.%20mai%202026%2c%2013_05_44%20(1)%20(1)-1.png)


