American Tooling Center: U.S. District Court finds no Coverage for Social Engineering Fraud Loss under Crime Policy’s Computer Fraud Insuring Agreement

On August 1, 2017, the U.S. District Court for the Eastern District of Michigan released its decision in American Tooling Center, Inc. v. Travelers Casualty and Surety Company of America. The Court held that a vendor impersonation fraud loss did not fall within the terms of a crime policy’s computer fraud coverage. In coming to this conclusion, the Court found there was no direct causal link between the receipt of fraudulent emails by an insured requesting payment to the fraudster’s bank account, and the insured’s authorized transfer of funds to that bank account.

 


The Facts

American Tooling Center (“ATC”) is a tool and die manufacturer that outsources some of its work to third-party vendors. One of its legitimate third-party vendors is Shanghai YiFeng Automotive Die Manufacture Co., Ltd. (“YiFeng”). ATC typically sends payment to YiFeng at the completion of various production milestones.

ATC fell victim to a vendor impersonation fraud, which is one of the most common forms of social engineering fraud. On March 18, 2015, ATC’s Vice-President and Treasurer received an email purportedly sent by YiFeng requesting payment to a new bank account. The email in question was sent from the domain name “@yifeng-rnould.com”, which resembled the legitimate domain name “@yifeng-mould.com”. ATC’s Vice-President and Treasurer verified that the applicable production milestones were satisfied, but did not verify the new banking information before wiring approximately $800,000 to the new bank account. When it came to light that YiFeng had never been paid the amounts it was owed, ATC submitted a claim to Travelers.


The Computer Fraud Coverage

ATC’s policy with Travelers provided coverage for:

… the Insured’s direct loss of, or direct loss from damage to, Money, Securities and Other Property directly caused by Computer Fraud.

 

The Travelers policy defined “Computer Fraud” as:

The use of any computer to fraudulently cause a transfer of Money, Securities or Other Property from inside the Premises or Financial Institution Premises:

1. to a person (other than a Messenger) outside the Premises or Financial Institution Premises; or

2. to a place outside the Premises or Financial Institution Premises.

Travelers took the view that, given the intervening events between the receipt of the fraudulent emails and the authorized transfer of funds, ATC had not suffered a direct loss directly caused by the use of any computer.

The Court agreed, observing that:

The fraudulent emails did not “directly” or immediately cause the transfer of funds from ATC’s bank account. Rather, intervening events between ATC’s receipt of the fraudulent emails and the transfer of funds (ATC verified production milestones, authorized the transfer, and initiated the transfer without verifying bank account information) preclude a finding of “direct” loss “directly caused” by the use of any computer.

The Court relied upon the Fifth Circuit’s recent Apache decision (see our October 24, 2016 post), making specific reference to that court’s observation that:

To interpret the computer-fraud provision as reaching any fraudulent scheme in which an email communication was part of the process would … convert the computer-fraud provision to one for general fraud.

The Court then considered other recent computer fraud decisions, such as Pestmaster (see our August 4, 2016 post) and InComm (see our March 22, 2017 post). Applying the principles from these decisions to the case at bar, the Court concluded:

Although fraudulent emails were used to impersonate a vendor and dupe ATC into making a transfer of funds, such emails do not constitute the “use of any computer to fraudulently cause a transfer.” There was no infiltration or “hacking” of ATC’s computer system. The emails themselves did not directly cause the transfer of funds; rather, ATC authorized the transfer based upon the information received in the emails. The Ninth Circuit [in Pestmaster] has interpreted the phrase “fraudulently cause a transfer” to “require the unauthorized transfer of funds.”[:] “Because computers are used in almost every business transaction, reading this provision to cover all transfers that involve both a computer and fraud at some point in the transaction would convert this Crime Policy into a ‘General Fraud’ Policy.” See also Incomm … (noting that “courts repeatedly have denied coverage under similar computer fraud provisions, except in cases of hacking where a computer is used to cause another computer to make an unauthorized, direct transfer of property or money”). [emphasis added]

The Court granted summary judgment in favour of Travelers.


Conclusion American Tooling Center represents another decision in a growing line of jurisprudence which holds that there is no coverage for vendor impersonation and other social engineering fraud losses under traditional commercial crime coverages. The insurance industry has responded by introducing social engineering fraud-specific coverage, which allows insureds to obtain coverage for certain types of losses that fall outside the coverage provided under traditional policy wordings.

Given the increasing frequency of vendor impersonation and other social engineering fraud losses, insureds would be well-advised to consult with their brokers and insurers about the risks that social engineering fraud poses to their business, and the availability of social engineering fraud-specific coverage.

American Tooling Center, Inc. v. Travelers Casualty & Surety Company of America, 2017 WL 3263356 (E.D. Mich.)

Fidelity Blog

Gore, Kilpatrick & Dambrino PLLC: U.S. District Court finds No Social Engineering Fraud Coverage in Phony Debt Collection Fraud

On March 31, 2026 the U.S. District Court for the Northern District of Mississippi released its decision in Gore, Kilpatrick & Dambrino PLLC v. Spinnaker Ins. Co.  The Court interpreted the requirements of a Social Engineering Fraud (SEF) insuring agreement in a cyber policy in the context of a phony debt collection fraud perpetrated on … Continued

by

Westlake Chemical: Texas Court of Appeals applies Authorized Representative Exclusion in finding No Coverage under Crime Policy for Phony Invoicing Scheme

On May 25, 2023, the Texas Court of Appeals released its decision in Westlake Chemical Corporation v. Berkley Regional Insurance Company.  The Court affirmed the District Court’s summary judgment in favour of the insurers on the basis that the Authorized Representative Exclusion applied.  The Court’s decision is notable in finding that the exclusion does not require … Continued

by

Cachet Financial Services: U.S. District Court finds No Coverage under Commercial Crime Policy for Alleged ACH Kiting and Related Frauds

In the recent decision of Cachet Financial Services v. Berkley Insurance Company, the United States District Court for the Central District of California found no coverage under a commercial crime policy in respect of several alleged frauds involving a payroll processor. The decision is instructive for fidelity claims professionals as to the meaning of “alteration” in … Continued

by

Star Title Partners: Eleventh Circuit finds No Coverage for Social Engineering Fraud Loss under Cybercrime Endorsement to Cyber Protection Policy

On September 6, 2022, the Eleventh Circuit Court of Appeals released its decision in Star Title Partners of Palm Harbor, LLC v. Illinois Union Insurance Company.  In deciding that a social engineering fraud (SEF) loss did not fall within the coverage afforded under a Deceptive Transfer Fraud insuring clause, the Court construed the terms “employee,” “customer,” … Continued

by

Mississippi Silicon: Fifth Circuit finds No Coverage for Social Engineering Fraud Loss under Crime Policy’s Computer Fraud Coverage

On February 4, 2021, the Fifth Circuit Court of Appeals released its decision in Mississippi Silicon Holdings, LLC v. AXIS Insurance Company. In affirming the lower court’s grant of summary judgment in favour of AXIS, the Fifth Circuit made important findings regarding the proper scope of the Computer Fraud coverage; whether a fraudster’s opening of a … Continued

by

All Fidelity Blog Posts