Skip to main content

Don’t become a victim of bankruptcy fraud




Your company has landed a lucrative new account, and the customer has already placed several small orders, paying in full, on time. Now the customer wants to place a larger order, but has requested that you first expand its credit account. Warning! There’s a chance that you could become a victim of bankruptcy fraud. Your new customer may be planning a “bust-out” — a common bankruptcy-related scam.

Bust-out scams

In a bust-out, fraudsters create a bogus company — often with a name similar to that of an established, reliable business — to order goods they have no intention of paying for. In fact, they plan to sell the products for fast cash, file for bankruptcy and leave you, the supplier, holding the empty bag.

In a variation of the scheme, bogus operators buy an existing company and use its good credit to order the goods. Either way, they sell the products they order below cost, for cash, and then file for bankruptcy, writing off the amounts of the supplier’s bill.

You can avoid becoming a bust-out victim by carefully vetting businesses that were formed only recently. Also be wary of established companies with new ownership — particularly if the new owners seem to want to keep their involvement under wraps. And pay particular attention to customers that have:

• Warehouses stuffed with high-volume, low-cost items, • Disproportionate liabilities to assets, • No corporate bank account, and • Principals previously involved with failed companies.

Fraudulent conveyance schemes
Bust-outs are far from the only bankruptcy-related scams. In fact, the most common type of bankruptcy fraud is concealing assets — or fraudulent conveyance. This scheme involves hiding or moving assets in anticipation of a bankruptcy. The owner of a business on the brink of collapse may, for example, transfer property to a third party — most commonly, a spouse — for little or no compensation. The third party holds the property until bankruptcy proceedings have concluded, and then transfers it back to the business owner.

Alternatively, the business owner files for bankruptcy and then, with the court’s approval, sells property below value to a straw buyer. The owner’s relationship with the buyer isn’t disclosed, but the buyer holds the property until the owner is ready to reclaim it at an agreed-upon price.

In either case, the goal is the same: to keep property and monetary compensation out of the hands of creditors.

Prevention first

Fighting bankruptcy fraud typically requires professional legal and financial help. The best protection is prevention, but if you suspect one of your customers is trying to pull a fast one, contact us.

© 2018

Popular posts from this blog

Tax Cuts and Jobs Act (TCJA) - Impact on Tax Exempt Organizations

The 2017 Tax Cuts and Jobs Act that was enacted late in 2017 made several changes to the tax laws affecting tax-exempt organizations, including a new Unrelated Business Taxable Income (“UBTI”) tax rate at a flat 21% for any UBTI over the $1,000 standard deduction.  Caution:  These changes will make some nonprofit organizations pay federal tax that have never been taxpayers in the past.

For more information see our client bulletin:

Bulletin

Preventing business identity theft: 5 tips

Identity theft isn’t just a consumer problem. Criminals steal the identities of businesses, too. In addition to filing fraudulent tax returns, criminals assume the identities of companies to apply for credit, impersonate authorized users and empty bank accounts. Here are five ways you can reduce the chance it will happen to your business.

1. Protect confidential documents

Secure sensitive paper documents such as financial statements, invoices, bank statements and aging schedules in locked file cabinets. Store digital files in secure, password-protected locations.

2. Shred documents you no longer need

When you no longer need sensitive paper documents, destroy them using a cross-cutting shredder. If you need to shred a significant volume of paper, hire a service to destroy documents on your premises.

3. Don’t drop your guard online

Thieves use malware to infect computers and gather sensitive data. They also create fake websites that trick employees into entering login and password i…