Local reporting in Parma Heights, Ohio, described a municipal email compromise where attackers spoofed city accounts and initiated fraudulent fund transfers, resulting in a stopped transaction and a reported net loss of about $225,000. Federal and state prosecutors and the FBI were reported to be involved in the investigation.

Cleveland News Today reported that Parma Heights, Ohio experienced a municipal email compromise in which attackers spoofed city email accounts and attempted fraudulent fund transfers. According to the local account, banks interdicted a transaction but the incident still produced a reported net loss of roughly $225,000 after adjustments and interventions. Federal and state prosecutors along with the FBI were reported to be involved in the investigation, underscoring the case as a typical business‑email‑compromise pattern that targets local governments and public entities. Officials emphasized the importance of multi‑step verification for large transfers, email authentication protocols such as SPF, DKIM and DMARC to reduce spoofing risk, and increased employee training on identifying fraudulent requests. The story also highlighted the role of fast bank notification and transaction holds in limiting loss, and it recommended that municipalities adopt stricter payment approval workflows, out‑of‑band verification for changes to payment instructions, and continuous monitoring to detect anomalous transfer attempts.