If you Owe more than $30,000 contact us for a case evaluation at (833) 428-0937
contact us for a free case evaluation at (833) 428-0937
Call us (833) 428-0937

Cybersecurity Breaches and SBA Loan Defaults: When Hackers Affect Loan Payments

Cybersecurity issues are a big deal, especially for small businesses that get loans from the SBA. When hackers mess with your business, it can make it really hard to pay back those loans. This article will talk about how these cyber problems happen, what kind of trouble they cause, and what you can do to keep your business safe and avoid loan defaults.

Key Takeaways

  • Small businesses are often targets for cyberattacks, which can mess up their ability to pay back SBA loans.
  • Big data breaches, like the ones at SBA and Bank of America, show how serious these risks are.
  • Ransomware and other cyber crimes can cost businesses a lot of money and hurt their reputation, making loan payments tough.
  • Identity theft can lead to fake loan applications, putting victims on the hook for money they never borrowed.
  • Knowing how to protect your business and what to do if a breach happens is super important for staying out of trouble with your loans.

Understanding Cybersecurity Risks for SBA Borrowers

The Rise of Cyber Threats During Economic Crises

Economic downturns often create a perfect storm for cybercrime. When businesses are struggling, they might cut corners on security, making them more vulnerable. Cybercriminals know this and often ramp up their activities during these times. The COVID-19 pandemic, for example, saw a huge spike in cyberattacks targeting small businesses seeking SBA loans. This is because emergency situations can lead to rushed decisions and overlooked security protocols, creating easy opportunities for exploitation. It's a harsh reality, but understanding this trend is the first step in protecting your business. The SBA offer in compromise can be negated by fraudulent activities.

Specific Vulnerabilities of Small Businesses

Small businesses are often seen as easy targets. They typically lack the resources and expertise to implement robust cybersecurity measures. This makes them attractive to hackers looking for a quick payday. Here are some common vulnerabilities:

  • Outdated software and systems
  • Weak passwords and poor password management
  • Lack of employee training on cybersecurity best practices
  • Insufficient firewalls and antivirus protection
  • Failure to regularly back up data
Many small business owners think, "It won't happen to me." This mindset is dangerous. Cybercriminals don't discriminate; they target anyone with a vulnerability. Proactive security measures are no longer optional; they're essential for survival.

Impact of Data Breaches on Loan Eligibility

A data breach can have serious consequences for a business's ability to secure or maintain an SBA loan. Beyond the immediate financial losses associated with recovery and remediation, a breach can damage a company's reputation and creditworthiness. Lenders may view a business that has experienced a breach as a higher risk, making it difficult to obtain future financing. Furthermore, if a breach leads to legal action or regulatory penalties, the resulting financial strain could jeopardize the business's ability to repay existing loans. It's a domino effect that can quickly lead to default. If you've been billed for a fraudulent SBA or PPP loan, you can contact the SBA’s Office of Disaster Assistance.

Major Cybersecurity Incidents Affecting SBA Programs

SBA Portal Breach and Compromised Applicant Data

In April 2020, the U.S. Small Business Administration (SBA) experienced a significant data breach. This breach affected the portal used by business owners applying for emergency loans during the COVID-19 pandemic. The incident exposed sensitive information of approximately 8,000 applicants.

  • Names
  • Social Security numbers
  • Email addresses
  • Dates of birth

The breach occurred around the same time that spam and phishing scams were on the rise, with many scams using language related to the pandemic and federal relief funds. It's a stark reminder of how cybercriminals exploit crises.

The SBA breach highlighted the vulnerabilities in systems designed to quickly disburse funds during emergencies. It underscored the need for robust security measures, even when speed is of the essence.

Bank of America's PPP Application Data Exposure

Around May 2020, Bank of America (BoA) notified some customers about a potential data exposure related to Paycheck Protection Program (PPP) applications. BoA had uploaded some customer's loan applications to a "limited access, controlled" SBA test application platform. While the bank claimed the platform was controlled, the incident raised concerns about data handling practices. This incident underscores the importance of data breach prevention and secure data transfer protocols when dealing with sensitive financial information.

Lessons from Past Breaches: Equifax and Unemployment Benefits

Past cybersecurity incidents, such as the Equifax breach and breaches affecting state unemployment benefits systems, offer valuable lessons for the SBA and its borrowers. For example, in May 2020, the Illinois Department of Employment Security (IDES) acknowledged a security lapse that exposed the private information of independent contractors and the self-employed. These incidents highlight the potential for widespread damage and the need for proactive security measures. We can learn from these events:

  • Implement stronger authentication methods.
  • Regularly update software to patch vulnerabilities.
  • Provide ongoing cybersecurity training to employees.

These breaches serve as a reminder that no organization is immune to cyberattacks, and a proactive approach to cybersecurity is essential. The rise of PPP fraud during the pandemic further emphasizes the need for vigilance and robust security protocols.

How Cyberattacks Lead to Loan Default Risks

Financial Strain from Ransomware and Data Recovery

Cyberattacks, especially ransomware, can cripple a business financially. The immediate cost of paying a ransom (which is often discouraged by experts) can be devastating, but it's just the tip of the iceberg.

  • Negotiating with cybercriminals can be expensive, involving specialized consultants.
  • Data recovery efforts, even without paying a ransom, require significant investment in IT services.
  • Forensic analysis to understand the breach and prevent future incidents adds to the financial burden.
The unexpected expenses associated with a cyberattack can quickly deplete a small business's cash reserves, making it difficult to meet regular obligations, including SBA loan payments.

Loss of Business Operations and Revenue

Cyberattacks frequently disrupt business operations, leading to a direct loss of revenue. This disruption can stem from various factors:

  • System downtime: When critical systems are offline, businesses can't process orders, provide services, or manage inventory.
  • Supply chain interruptions: Attacks on suppliers can halt production and delay deliveries.
  • Customer distrust: Data breaches can erode customer trust, leading to a decline in sales.

This loss of revenue directly impacts a business's ability to service its debts, including SBA loan payments. The longer the disruption, the greater the risk of default.

Reputational Damage and Customer Exodus

A data breach can severely damage a company's reputation, leading to a loss of customers and long-term financial instability. Customers are increasingly concerned about data privacy and security, and a breach can drive them to competitors.

  • Negative press coverage can amplify the damage, making it harder to attract new customers.
  • Social media backlash can further erode trust and brand loyalty.
  • The cost of rebuilding a damaged reputation can be substantial, requiring investment in public relations and marketing efforts.

This loss of customers and the associated decline in revenue can make it difficult for businesses to meet their financial obligations, increasing the risk of defaulting on their SBA loans. The impact of reputational damage is often underestimated but can be a critical factor in a business's long-term viability.

The Connection Between Identity Theft and Loan Fraud

Fraudulent Loan Applications Using Stolen Identities

Identity theft and loan fraud are, unfortunately, closely linked. A thief can use your stolen personal information to apply for loans in your name, leaving you with the debt and a damaged credit score. It's surprisingly easy for criminals to get enough information to apply for a loan, especially with the amount of data available on the dark web. They might use phishing scams or malware to steal your data, or even intercept your mail with a mail forwarding scam.

Paycheck Protection Program (PPP) Fraud Schemes

The Paycheck Protection Program (PPP), designed to help small businesses during the COVID-19 pandemic, became a prime target for fraud. Scammers used stolen or synthetic identities to apply for multiple PPP loans, often creating fake businesses to support their applications. This not only diverted funds from legitimate businesses but also left victims of identity theft with unexpected tax liabilities and legal troubles. The government is still working to untangle the web of PPP fraud and bring the perpetrators to justice.

The Dangers of Payday Loan Scams

Payday loan scams are another area where identity theft can cause significant harm. These scams often involve criminals using stolen information to take out high-interest payday loans in someone else's name. The victim is then left to deal with the debt, which can quickly spiral out of control due to the exorbitant interest rates and fees associated with payday loans. Always question who you give information to, especially your Social Security number and bank account numbers.

Loan fraud is often one of the first things scammers do with your stolen identity. By staying alert, you can avoid many types of loan fraud and stay safe.

Here are some types of loan fraud to avoid:

  • Credit card fraud
  • Car loan fraud
  • Home loan (mortgage) fraud

Consequences of Loan Fraud for Victims

Personal Liability for Fraudulent Loans

When someone steals your identity and takes out a loan in your name, the nightmare is just beginning. You could be held personally liable for repaying that loan, even though you never received the money or benefited from it. This means debt collectors might come after you, and your wages could be garnished. It's a tough situation to be in, especially when you're the victim of a crime. You'll need to prove that you were a victim of identity theft and didn't authorize the loan, which can be a long and stressful process. It's also worth noting that compliance audits can uncover these discrepancies, adding another layer of complexity.

Negative Impact on Credit Scores and Financial Standing

Loan fraud can seriously mess up your credit score. Late payments or defaults on fraudulent loans will show up on your credit report, tanking your score. This can make it hard to get approved for future loans, rent an apartment, or even get a job. A damaged credit score can haunt you for years, making it harder to achieve your financial goals. Here are some ways your credit score can be affected:

  • Lowered credit score due to missed payments.
  • Difficulty obtaining new credit cards or loans.
  • Higher interest rates on future borrowing.
Dealing with the aftermath of loan fraud is not just about the immediate financial hit. It's about the long-term damage to your creditworthiness and overall financial stability. Rebuilding your credit after such an event takes time, effort, and a lot of patience.

Potential for Criminal Prosecution of Victims

In some awful cases, victims of loan fraud might even face the risk of criminal prosecution. This usually happens when there's confusion or a lack of clear evidence about who actually committed the fraud. For example, if the lender suspects you were involved in the scheme, they might press charges. Even if you're innocent, you'll have to defend yourself in court, which can be expensive and emotionally draining. It's a scary thought, but it highlights the importance of reporting fraud immediately and gathering as much evidence as possible to prove your innocence. Here are some steps to take to protect yourself:

  • Report the fraud to the police and the FTC.
  • Gather all relevant documents and evidence.
  • Seek legal counsel to understand your rights and options.

Protecting Your Business from Cyber Threats

Implementing Robust Cybersecurity Measures

It's easy to think "it won't happen to me," but that's exactly what hackers are counting on. Having a solid cybersecurity plan is no longer optional; it's a necessity for survival. Think of it like this: you wouldn't leave your front door unlocked, right? Your digital doors need the same level of protection. Here are some things to consider:

  • Install and maintain firewalls. A firewall acts as a barrier between your network and the outside world, blocking unauthorized access.
  • Use intrusion detection and prevention systems. These systems monitor your network for suspicious activity and automatically take action to block or mitigate threats.
  • Regularly update software and operating systems. Updates often include security patches that fix vulnerabilities that hackers can exploit. Neglecting updates is like leaving a window open for intruders.
Small businesses are often targeted because they lack the resources and expertise to implement strong security measures. Don't let your business be an easy target. Invest in cybersecurity, and you'll be investing in the future of your company.

Employee Training on Phishing and Social Engineering

Your employees are your first line of defense, but they can also be your weakest link if they're not properly trained. Phishing and social engineering attacks are designed to trick people into giving up sensitive information or clicking on malicious links. It's important to teach your employees how to spot these scams. Some key training points include:

  • Recognizing phishing emails: Teach employees to look for suspicious sender addresses, grammatical errors, and urgent or threatening language.
  • Avoiding suspicious links and attachments: Emphasize the importance of verifying the legitimacy of links and attachments before clicking on them.
  • Understanding social engineering tactics: Explain how social engineers might try to manipulate them into revealing confidential information.

Regular Security Audits and Vulnerability Assessments

Think of a security audit as a check-up for your business's digital health. It involves a thorough review of your security policies, procedures, and infrastructure to identify any weaknesses or vulnerabilities. A vulnerability assessment goes a step further by actively scanning your systems for known vulnerabilities that hackers could exploit. Here's why these are important:

  • Identify weaknesses: Audits and assessments help you find gaps in your security posture before hackers do.
  • Prioritize remediation efforts: They allow you to focus on the most critical vulnerabilities first.
  • Ensure compliance: Regular audits can help you meet regulatory requirements and industry best practices. Consider using a cybersecurity report to keep track of your progress.

Safeguarding Personal Information and Business Data

Best Practices for Data Encryption and Storage

Okay, so you've got all this data, right? Customer info, financial records, the secret family recipe for your famous BBQ sauce – you name it. Encryption is your best friend here. Think of it as scrambling everything up so that if someone does manage to sneak in, they just see gibberish. For storage, don't just dump everything on some random hard drive.

Here's a few things to consider:

  • Use reputable cloud services with strong security measures.
  • Encrypt data both in transit and at rest.
  • Regularly back up your data to a secure, offsite location.
It's not enough to just have a password on your computer. You need to actively protect your data with encryption and secure storage practices. It's like locking your front door, but also hiding your valuables in a safe.

Secure Password Policies and Multi-Factor Authentication

Passwords. We all hate them, but we all need them. "Password123" just isn't going to cut it anymore. A strong password is your first line of defense. Make them long, complex, and unique. And for goodness' sake, don't reuse them across multiple accounts! Multi-factor authentication (MFA) is like adding extra locks to that front door. It means even if someone guesses your password, they still need a second form of verification, like a code sent to your phone.

Some tips for better security:

  • Require employees to use strong, unique passwords.
  • Implement multi-factor authentication for all critical systems.
  • Use a password manager to generate and store passwords securely.

Understanding Data Privacy Regulations

Data privacy regulations are a maze, I know. But ignoring them is a recipe for disaster. Depending on your business and where your customers are located, you might need to comply with regulations like GDPR, CCPA, or others. These laws dictate how you collect, use, and store personal data. Failing to comply can result in hefty fines and reputational damage. Make sure you understand your obligations and implement policies to meet them. The GSA outlines its policies and best practices for handling Personally Identifiable Information (PII) in accordance with the Privacy Act.

Consider these points:

  • Familiarize yourself with relevant data privacy regulations.
  • Develop a privacy policy that is clear and easy to understand.
  • Obtain consent before collecting and using personal data.

Steps to Take After a Suspected Data Breach

Immediate Actions to Contain the Breach

Okay, so you think you've had a data breach. Don't panic (yet!). The first few hours are critical. Here's what you need to do, like, now:

  • Isolate affected systems: Disconnect them from the network to prevent further spread.
  • Change passwords: Immediately reset passwords for all accounts that might be compromised.
  • Backups: Verify the integrity of your most recent backups and store them offline.
Think of it like a house fire. You wouldn't just stand there and watch it burn, right? You'd grab the fire extinguisher and try to contain it. Same principle here. Quick action can minimize the damage.

Notifying Affected Parties and Authorities

Once you've contained the immediate threat, it's time to start informing people. This isn't fun, but it's necessary. You'll need to notify:

  • Customers: Let them know their data might be at risk and what steps they should take to protect themselves. Transparency is key here.
  • Employees: Inform your staff about the breach and any potential risks they face.
  • Authorities: Depending on the type of data breached and where you're located, you may be legally obligated to notify certain government agencies. Check with legal counsel to understand your obligations. You might need to contact the SBA and relevant agencies.

Engaging Cybersecurity Experts for Remediation

Let's be real, unless you're a cybersecurity expert, you're probably out of your depth at this point. It's time to call in the pros. A good cybersecurity firm can help you:

  • Identify the source of the breach: Figure out how the attackers got in so you can prevent it from happening again.
  • Remediate the damage: Clean up any malware, fix vulnerabilities, and restore systems to a secure state.
  • Conduct a forensic analysis: Determine the scope of the breach and what data was compromised. This is crucial for notifying affected parties and complying with regulations. They can also help you implement robust cybersecurity measures.

Reporting and Recovering from Loan Fraud

Contacting the SBA and Relevant Agencies

If you suspect you've been a victim of loan fraud related to an SBA loan, it's important to act quickly. Your first step should be to contact the SBA directly to report the incident. You can usually do this through the SBA’s website. Make sure to gather all relevant documentation, such as loan paperwork, bank statements, and any communication you've had with the lender. In addition to the SBA, you should also consider reporting the fraud to other relevant agencies, such as:

  • The Federal Trade Commission (FTC) at ReportFraud.ftc.gov.
  • Your state's Attorney General.
  • The Consumer Financial Protection Bureau (CFPB).
Reporting the fraud helps these agencies track patterns and potentially prevent others from falling victim to similar scams. It also creates a record of the incident, which can be helpful if you need to dispute fraudulent charges or loans later on.

Setting Up Credit Freezes and Fraud Alerts

One of the most effective ways to protect yourself after discovering loan fraud is to set up a credit freeze with all three major credit bureaus: Experian, Equifax, and TransUnion. A credit freeze restricts access to your credit report, making it more difficult for scammers to open new accounts in your name. Fraud alerts are less restrictive than credit freezes, but they still require lenders to take extra steps to verify your identity before issuing credit. Here's what you should do:

  • Contact each of the three credit bureaus individually to request a credit freeze or fraud alert.
  • You'll likely need to provide some personal information to verify your identity.
  • Keep records of your requests, including confirmation numbers and dates.

Utilizing Identity Theft Protection Services

Consider enrolling in an identity theft protection service. These services monitor your credit reports, bank accounts, and other personal information for signs of fraud. They can also provide assistance with restoring your identity if it's been compromised. Some services offer features like:

  • Credit monitoring and alerts.
  • Dark web scanning for your personal information.
  • Identity theft insurance to cover expenses related to recovery.
  • Assistance with filing police reports and disputing fraudulent charges.

Choosing the right identity theft protection service depends on your individual needs and budget. Compare different providers and look for one that offers comprehensive coverage and a good reputation.

Government and Regulatory Responses to Cybercrime

FBI and FTC Involvement in Loan Fraud Investigations

When it comes to loan fraud, especially when cybercrime is involved, the FBI and FTC are key players. The FBI often handles the more serious, large-scale fraud cases, bringing their resources to bear on complex investigations. The FTC, on the other hand, focuses on protecting consumers and preventing deceptive business practices. Both agencies work to investigate and prosecute individuals and groups engaged in fraudulent activities related to SBA loans and other financial schemes.

  • The FBI's Internet Crime Complaint Center (IC3) is a great resource for reporting cybercrimes.
  • The FTC provides guidance on avoiding scams and identity theft.
  • Collaboration between these agencies helps to address different aspects of cyber-enabled loan fraud.
It's important to remember that these agencies are there to help. If you suspect you've been a victim of loan fraud or identity theft, reporting it to the FBI and FTC is a crucial step in protecting yourself and helping them catch the criminals.

Penalties for Perpetrators of Financial Crimes

Financial crimes, especially those involving SBA loans, carry significant penalties. These penalties can range from hefty fines to lengthy prison sentences, depending on the severity and scope of the fraud. Perpetrators might face charges like wire fraud, mail fraud, and conspiracy, each carrying its own set of consequences. The government takes these crimes seriously because they can undermine the integrity of financial systems and harm individuals and businesses. If you are facing SBA debt, you should know that there are SBA debt services available.

  • Fines can reach hundreds of thousands or even millions of dollars.
  • Prison sentences can range from several years to decades.
  • Asset forfeiture is also a common penalty, where the government seizes assets obtained through illegal activities.

Ongoing Monitoring of Fraud Schemes

Government agencies are constantly working to monitor and adapt to new fraud schemes. Cybercriminals are always evolving their tactics, so it's important for regulators to stay one step ahead. This involves using data analytics to identify suspicious patterns, sharing information between agencies, and working with the private sector to improve cybersecurity. The goal is to detect and disrupt fraud schemes before they can cause widespread damage.

  • Regular updates to cybersecurity protocols are essential.
  • Public awareness campaigns help educate people about current scams.
  • Collaboration with financial institutions improves fraud detection capabilities.

Future Outlook: Mitigating Cybersecurity Risks for SBA Borrowers

The world of cybersecurity is always changing, and it's important for SBA borrowers to stay ahead of the curve. What works today might not work tomorrow, so a proactive approach is key. It's not just about having firewalls and antivirus software; it's about creating a culture of security within your business. Let's look at what the future holds and how to prepare.

Evolving Threat Landscape and Proactive Defense

The threat landscape is constantly evolving. Hackers are always finding new ways to exploit vulnerabilities, and small businesses are often seen as easy targets. Proactive defense is no longer optional; it's a necessity. This means staying informed about the latest threats, updating security measures regularly, and being prepared to respond quickly to any incidents. Think of it like this: you wouldn't wait for your house to be robbed before locking the doors, right? The same principle applies to cybersecurity.

Collaboration Between Government and Private Sector

Fighting cybercrime requires a team effort. The government and private sector need to work together to share information, develop best practices, and provide resources to small businesses. This collaboration can take many forms, from joint training programs to information-sharing platforms. For example, the SBA could partner with cybersecurity firms to offer discounted services to borrowers. It's about creating a network of support that helps small businesses stay safe. The Hardship Accommodation Plan (HAP) is a good example of how government programs can adapt to support businesses in times of crisis.

Empowering Small Businesses with Cybersecurity Knowledge

Ultimately, the best defense against cyber threats is an informed and empowered workforce. Small business owners and their employees need to understand the risks and know how to protect themselves. This includes training on topics like phishing, password security, and data privacy. It's also about creating a culture of security where everyone feels responsible for protecting sensitive information. Here are some ways to empower your business:

  • Regular training sessions for all employees.
  • Easy-to-understand security policies and procedures.
  • Incentives for reporting potential security incidents.
By investing in cybersecurity knowledge, small businesses can reduce their risk of becoming victims of cybercrime and protect their financial futures. It's an investment that pays off in the long run.

It's super important for small businesses to be ready for online dangers. Thinking ahead about these risks can save you a lot of trouble and money. If you're an SBA borrower and need help understanding how to protect your business, we're here for you. Don't wait until it's too late; get a free case evaluation today to keep your business safe.

Wrapping Things Up

So, what's the big takeaway here? It's pretty clear that when hackers mess with businesses, especially small ones, it can really mess up their ability to pay back loans. We've seen how these cyberattacks, whether it's stealing info or tricking people, can lead to big problems like loan defaults. It's not just about losing money; it's about businesses struggling to stay afloat and people getting their personal details exposed. This whole situation just shows how important it is for everyone, from business owners to government agencies, to be super careful about online security. We all need to work together to keep things safe and make sure these kinds of attacks don't cause even more trouble down the road. Staying alert and taking steps to protect data is just a must these days.

Frequently Asked Questions

How can a cyberattack mess up my small business loan payments?

Cyberattacks are bad news for small businesses. When hackers get in, they can steal money, mess up your computer systems, or even stop your business from working. This can make it hard to pay back loans, especially if you're counting on that money to keep things running.

Can someone use my stolen information to get a loan in my name?

Yes, it happens. Hackers can steal your personal info, like your Social Security number, and then use it to apply for loans in your name. This is called identity theft, and it can leave you on the hook for money you never borrowed.

What happens if I'm a victim of loan fraud?

If someone takes out a fake loan in your name, you might be responsible for paying it back. It can also hurt your credit score, making it harder to get loans in the future. In some serious cases, you could even face legal trouble if the fake loan isn't paid.

What should I do if I think I'm a victim of loan fraud?

You should tell the SBA and other important groups right away. You can also freeze your credit to stop new fake loans and sign up for services that protect your identity. It's important to act fast!

Why are small businesses a target for cyberattacks?

Cyberattacks are a big problem for everyone, especially small businesses. They often don't have strong computer defenses. Plus, during tough times like the COVID-19 pandemic, hackers try even harder to trick people.

How can I protect my business from hackers?

You can do a lot! Make sure your computer systems are secure, train your employees to spot tricky emails (like phishing scams), and regularly check your systems for weaknesses. Using strong passwords and two-step verification also helps a lot.

What should I do right after a cyberattack happens?

If your business gets hacked, first, try to stop the attack from spreading. Then, tell anyone who might be affected and contact the right authorities. It's a good idea to get help from computer security experts to fix the problem.

What is the government doing about loan fraud and cybercrime?

The government takes loan fraud very seriously. Groups like the FBI and the FTC work to find and punish the people who commit these crimes. They are always watching out for new ways scammers try to trick people.

Frequently Asked Questions

$337,000 SBA 504 LOAN - SBA OIC CASH SETTLEMENT

$337,000 SBA 504 LOAN - SBA OIC CASH SETTLEMENT

Clients personally guaranteed an SBA 504 loan balance of $337,000.  The Third Party Lender had obtained a Judgment against the clients.  We represented clients before the SBA and negotiated an SBA OIC that was accepted for $30,000.

$430,000 SBA 7A LOAN - NEGOTIATED WORKOUT AGREEMENT

$430,000 SBA 7A LOAN - NEGOTIATED WORKOUT AGREEMENT

Clients' 7(a) loan was referred to Treasury's Bureau of Fiscal Service for enforced collection in 2015. They not only personally guaranteed the loan, but also pledged their primary residence as additional collateral.  One of the clients filed for Chapter 7 bankruptcy thinking that it would discharge the SBA 7(a) lien encumbering their home. They later discovered that they were mistakenly advised. The Firm was subsequently hired to review their case and defend against a series of collection actions. Eventually, we were able to negotiate a structured workout for $180,000 directly with the SBA, saving them approximately $250,000 (by reducing the default interest rate and removing Treasury's substantial collection fees) and from possible foreclosure.

$375,000 SBA 504 LOAN - SBA OIC CASH SETTLEMENT

$375,000 SBA 504 LOAN - SBA OIC CASH SETTLEMENT

The client personally guaranteed an SBA 504 loan balance of $375,000.  Debt had been cross-referred to the Treasury at the time we got involved with the case.  We successfully had debt recalled to the SBA where we then presented an SBA OIC that was accepted for $58,000.

Read more Case Results