What is Business Email Compromise (BEC)?

4 min. read

Business Email Compromise (BEC) is a type of scam in which threat actors exploit vulnerabilities in email systems. They often impersonate trusted figures in an organization (CEOs, financial officers, etc.) to manipulate employees into transferring funds or revealing sensitive information.

These attacks rely heavily on social engineering tactics, making them difficult to detect, and have resulted in billions of dollars in losses globally. While attackers may also gather information during this process, the primary focus of BEC scams is the fraudulent transfer of funds. These scams have become more prevalent due to the rise of remote work and the increasing technical skills and advanced tactics used by hackers.

The Prevalence of BEC Scams

According to the 2022 Incident Response Report from Unit 42, business email compromise scams are on the rise and incredibly costly. Unit 42’s investigations identified that the average amount of successful wire fraud was $286,000 across the cases in which they worked. The U.S. Federal Bureau of Investigation stated in its 2021 Internet Crime Report that BEC and email account compromise (EAC, which is email fraud against individuals) accounted for $2.4 billion in losses in 2021 alone.

How Do BEC Scams Work?

Business Email Compromise Case Study: This diagram shows how a BEC cycle works, from the initial fake email to the wire transfer paid out to the threat actor.

In BEC scams, threat actors impersonate someone within an organization who can make a legitimate wire transfer of funds. Typically, they will pretend to be a vendor (e.g., a company the organization regularly does business with) or an executive (e.g., CEO or CFO). These scammers rely on the authority of the figure they’re impersonating to steal from a person or company.

Impersonation Techniques

Cybercriminals often employ spear-phishing to impersonate high-ranking executives. They meticulously craft emails that mimic the targeted executive's tone, style, and signature. Attackers may even spoof email addresses to resemble legitimate ones, making detection challenging closely.


Explore the differences between BEC and phishing scams to leverage the most effective preventive technologies: What Is the Difference Between BEC and Phishing?


Another technique involves compromising an executive's actual email account through credential theft, granting attackers direct access to internal communications. This access allows them to issue seemingly authentic requests for wire transfers or sensitive data.

Attackers also exploit publicly available information from social media and corporate websites to enhance the credibility of their impersonation. Referencing real projects, meetings, or personal details creates a sense of urgency and authenticity that pressures employees into compliance.

Using language and context that aligns with the organization's internal culture further deceives recipients. These sophisticated impersonation techniques highlight the critical need for comprehensive email security protocols and continuous employee awareness training.

Phases of a BEC Attack

In an account compromise attack, scammers typically take calculated steps to gain unauthorized access to an email account and use it for fraudulent activities. Stages of an account compromise attack include:

Reconnaissance

Attackers gather information about the target company using social media, corporate websites, and other publicly available information. They typically target employees with the authority to execute financial transactions.

Weaponization and Delivery

Attackers create a method of intrusion with socially engineered emails tailored to the specific individuals identified in the reconnaissance stage. Emails may contain malicious attachments or links designed to harvest login credentials or install malware to access the victim's email account directly.

Exploitation and Installation

When the victim clicks a malicious link or downloads an attachment, the hacker installs malware or harvests credentials to gain unauthorized access to the email account. This may involve keyloggers, backdoors, or other types of malware to maintain persistent access.

Command and Control

With access to the account, attackers silently monitor the victim’s email communications. This lets an attacker understand the organization’s billing cycles, payment processes, and upcoming financial transactions. It also enables them to identify the communication style of the compromised account and mimic it effectively in later stages.

Internal Reconnaissance

Before executing the scam, attackers often use the compromised account to gather more information internally. They may send emails to other employees to gain insights into financial operations, verify the process of invoice approvals, or identify additional accounts to compromise.

Execution of the Fraudulent Transaction

Armed with detailed knowledge and access, the attacker, posing as the compromised account holder, initiates a fraudulent financial request. This could involve sending an email to the finance department or a financial institution, requesting a wire transfer, changing account information for invoice payments, or directing funds to an account controlled by the attacker.

Concealment

To prolong their presence within the network and avoid detection, attackers attempt to cover their tracks. This may involve deleting sent emails that could raise suspicion or using other compromised accounts to validate their fraudulent activities.

Social Engineering

Attackers exploit human psychology to manipulate employees into divulging sensitive information or performing unauthorized actions. They often impersonate trusted figures, using language and context that align with the target's expectations. By leveraging authority, urgency, and familiarity, they create a sense of obligation and haste.

Social engineering tactics bypass technical defenses, relying instead on the natural human tendency to trust and respond to perceived superiors. Phishing emails, phone calls, and social media interactions are vectors for these manipulative techniques. The success of social engineering hinges on the attackers' ability to convincingly mimic legitimate communication, making vigilance and training crucial for prevention.

Financial Gain

By orchestrating BEC attacks, attackers reap substantial financial rewards. They often redirect large wire transfers to accounts under their control, exploiting the trust between businesses and their partners.

Cybercriminals also capitalize on compromised email accounts to initiate fraudulent invoice schemes, tricking companies into paying for goods or services never rendered. By infiltrating email threads, they can alter payment details, ensuring funds are misdirected.

The financial impact extends beyond immediate losses, often incurring significant recovery costs and damaging business reputations.

Targets of BEC Scams

Threat actors tend to target people with decision-making authority or access to financial information processes. While that can be anyone at the company, historically, the following roles are at higher risk of receiving a BEC scam or having their names used in a BEC scam:

  • Leaders and Executives: These roles are targeted for impersonation, as leaders sometimes have contact information on the company website or their personal LinkedIn page.
  • Finance: Whether dealing with internal or external finances, people in roles within Accounts Payable are targeted because of their access to information like banking details and the ability to authorize and send payments.
  • Human Resources: HR managers are targeted for information-stealing campaigns because they are near important personal information, such as contact information or social security numbers.
  • New or Entry-Level Employees: New or entry-level employees are often targeted for scam emails as they’re likely to be less familiar with a company’s protocols and less likely to identify a suspicious email. Sometimes, these employees can be pressured more easily or feel more self-conscious if they try to verify communication.

Psychological Tactics Used in BEC

Cybercriminals manipulate emotions and cognitive biases to create convincing scenarios. Attackers often exploit trust and authority, posing as high-ranking officials to gain compliance.

They also create a sense of urgency, pressuring victims to act quickly without verifying the request's legitimacy.

These psychological strategies make BEC attacks highly effective, as they prey on human vulnerabilities rather than technical flaws. Understanding these tactics is crucial for developing effective countermeasures and training programs to protect organizations from such sophisticated threats.

Types of BEC

Cybercriminals employ various tactics to execute Business Email Compromise (BEC) attacks. Each method requires tailored prevention strategies.

CEO Fraud

Cybercriminals craft convincing emails that appear to come from the CEO, often requesting urgent wire transfers or sensitive information. These emails exploit the executive's authority and the request's urgency, pressuring employees to act quickly without verification. Attackers research organizational hierarchies and communication styles to make their messages more believable. Sometimes, they even hack the CEO's email account, adding an extra layer of authenticity.

Account Compromise

Cybercriminals infiltrate legitimate email accounts, accessing sensitive communications and confidential data. Once inside, they monitor conversations, waiting for the perfect moment to strike.

They might redirect invoices, alter payment details to siphon funds, or impersonate the account holder to request financial transfers. This stealthy approach often goes unnoticed once significant damage has been done. Attackers exploit weak passwords, lack of multi-factor authentication, and phishing schemes to gain entry.

False Invoice Scheme

Cybercriminals fabricate fake invoices, sending them to unsuspecting employees who process payments. These invoices often appear legitimate, mimicking authentic vendors. Once paid, the funds are transferred to accounts controlled by the criminals. Vigilance and verification processes are crucial to prevent falling victim to these deceptive tactics, which can result in substantial financial loss.

Attorney Impersonation

Cybercriminals pose as attorneys, exploiting the urgency and authority associated with legal matters. They craft convincing emails, often requesting immediate fund transfers or sensitive information. These messages typically mimic the tone and format of legitimate legal correspondence, making detection challenging. Verifying the sender's identity through independent channels is essential to thwart these schemes.

Data Theft

Cybercriminals infiltrate email systems to harvest sensitive data, including financial records, intellectual property, and personal information. They often use phishing techniques to gain access, then quietly siphon off valuable data over time. This stolen information can be sold on the dark web or used for further malicious activities, severely damaging the targeted business.


Explore the most common types of BEC scams in depth: What Are Types of Business Email Compromise (BEC) Scams?


BEC Common Elements and Warning Signs

Cybercriminals craft BEC emails with specific elements to enhance their deception. These emails often exhibit time sensitivity, an authoritative sender, thorough impersonation, and specific instructions. Each characteristic is crucial in manipulating the recipient into complying with fraudulent requests, increasing the likelihood of a successful compromise:

  • Time sensitivity: Cybercriminals exploit urgency by setting tight deadlines and pressuring recipients to act quickly without verifying details, leveraging stress and fear to make victims more likely to comply impulsively.
  • Authoritative sender: Threat actors impersonate high-ranking executives to manipulate recipients and exploit trust and hierarchy, making employees more likely to follow instructions without question.
  • Thorough Impersonation: Cybercriminals meticulously mimic writing styles, email addresses, and signatures to deceive recipients and facilitate successful scams.
  • Specific Instructions: Cybercriminals include urgent instructions that exploit the recipient's sense of urgency and authority, increasing the likelihood of compliance.

Industry-Specific BEC Examples

Financial services firms often face BEC attacks targeting wire transfers. Cybercriminals impersonate executives to request urgent fund transfers, exploiting the fast-paced nature of financial transactions.

In healthcare, attackers frequently pose as suppliers or vendors, sending fraudulent medical equipment or service invoices. Hospitals under pressure to maintain operations may process these payments without thorough verification.

In real estate, fraudsters intercept communications between buyers and agents, altering bank details to divert closing payments. Manufacturing companies are not immune; attackers infiltrate email chains to redirect payments meant for suppliers. Educational institutions also fall prey, with scammers posing as university officials to reroute tuition payments.

Each industry faces unique vulnerabilities, but the common thread remains the exploitation of trust and urgency. Tailoring security measures to address specific industry risks can significantly reduce the likelihood of successful BEC attacks.


Learn about the nuances of BEC attacks through real-life scenarios: What are Examples of Business Email Compromise (BEC)?


How to Protect Against BEC Attacks

Organizations must adopt comprehensive strategies to shield against Business Email Compromise (BEC) attacks.

Multi-Layered Defenses

Deploying multi-layered defenses involves integrating various security measures to create a fortified barrier against BEC attacks. Email authentication protocols like SPF, DKIM, and DMARC verify sender legitimacy, while advanced threat protection systems scan for malicious content: regular software updates and patch management close vulnerabilities. User behavior analytics detect unusual activities, triggering alerts for potential threats.

User Training

Training employees to recognize phishing attempts and suspicious emails is crucial:

  • Simulated phishing exercises test their awareness and response.
  • Regular workshops and updated guidelines keep staff informed about evolving threats.
  • Encourage reporting of dubious emails to IT for further analysis.
  • Emphasize the importance of verifying unexpected requests for sensitive information or financial transactions.

Empowering users with knowledge and vigilance forms a critical line of defense against Business Email Compromise attacks.

Technical Measures

Employing the following technical measures creates a comprehensive defense, complementing user training efforts, to safeguard against Business Email Compromise attacks:

  • Implementing multi-factor authentication (MFA) significantly reduces the risk of unauthorized access.
  • Email filtering systems block phishing emails before they reach inboxes.
  • Domain-based Message Authentication, Reporting & Conformance (DMARC) protocols authenticate sender identities, preventing email spoofing.
  • Encryption ensures that sensitive data remains secure during transmission.
  • Regular software updates and patches close vulnerabilities that attackers might exploit.
  • Advanced threat detection tools monitor email traffic for unusual patterns, providing early warnings of potential breaches.

Understand the tools and technologies used by perpetrators of BEC scams: What Are BEC Tools and Technologies?


Incident Response Plans

Swiftly identifying and containing BEC attacks hinges on a well-crafted incident response plan.

  • Establish clear protocols for reporting suspicious emails and unauthorized transactions.
  • Designate a response team with defined roles and responsibilities to act immediately upon detection.
  • Conduct regular drills to ensure team readiness and refine procedures.
  • Use forensic analysis tools to trace the origin and scope of the breach, preserving evidence for potential legal action.
  • Notify affected parties and stakeholders promptly to mitigate further damage.
  • Collaborate with law enforcement and cybersecurity experts to understand the attack's intricacies and prevent recurrence.
  • Document every step taken during the response to create a comprehensive incident report. This report aids post-incident analysis, identifies weaknesses and improves future defenses.
  • Update the response plan regularly to adapt to evolving threats and ensure it remains an effective tool in the fight against Business Email Compromise.

Discover the key steps to effectively respond to a BEC incident: What Is Business Email Compromise (BEC) Incident Response?


Zero Trust Architecture

Zero Trust is the principle that an organization should not, by default, trust any user or device attempting to connect to its network. By adopting a Zero Trust framework, organizations can enforce the principle of least privilege, granting users only the necessary access rights required to perform their jobs. This reduces the potential attack surface and the risk of further unauthorized data access even if the user’s credentials are stolen.

Implement a Secure Payment Platform

Companies that process payments through email are more likely to fall for scams because threat actors can change details that might escape a human’s notice, like spoofing an email address or changing an account number. Facilitating payments through a secure, verified payment platform provides extra protection against scams.

Assess the State of Your SOC

Invite experts to run non-disruptive tests in your environment and identify any gaps in your system to ensure you have the right people, processes, and controls to defend against BEC scams.

Frequent Audits and Reviews

Conduct regular audits of financial transactions and reviews of security protocols to identify potential vulnerabilities and assess the effectiveness of current measures.

Regular Software and System Updates

Ensure all software, including email systems and security tools, are regularly updated. Outdated software can have vulnerabilities that cybercriminals exploit, so keeping everything up to date is a crucial defensive measure against BEC attacks.

Legal and Regulatory Implications of BEC

Legal and regulatory implications of BEC are profound and multifaceted. Perpetrators face severe legal consequences under various national and international laws, including hefty fines and long-term imprisonment.

Businesses must adhere to stringent regulatory requirements to safeguard sensitive information and financial assets. Compliance with frameworks like GDPR, SOX, and HIPAA is crucial to avoid penalties and reputational damage.

Reporting obligations mandate that companies promptly disclose BEC incidents to relevant authorities and affected parties. Failure to report can result in additional legal repercussions and undermine trust. Understanding these implications helps organizations better prepare and respond to BEC threats.

The Role of AI and Machine Learning in BEC Prevention

AI and machine learning play pivotal roles in preventing BEC. These technologies enhance the detection and mitigation of fraudulent activities by analyzing vast amounts of data and identifying patterns that human eyes might miss.

  • AI-based email filtering systems scrutinize incoming emails for signs of deception, such as unusual language patterns or spoofed email addresses.
  • Machine learning algorithms excel at anomaly detection, flagging emails that deviate from established organizational communication norms.
  • Predictive analytics further bolsters defenses by assessing potential threats based on historical data and emerging trends.

Together, these advanced technologies form a multi-layered defense strategy, significantly reducing the risk of BEC incidents. By continuously learning and adapting to new tactics employed by cybercriminals, AI and machine learning provide a dynamic approach to safeguarding sensitive information and financial assets.

Future Trends in BEC Attacks

Cybercriminals continuously adapt their strategies, making business email compromise a moving target for cybersecurity professionals. Attackers now employ advanced techniques such as deepfake audio and video to enhance their impersonation efforts.

Machine learning algorithms enable them to craft more convincing emails by analyzing organizational communication patterns. The evolution of BEC tactics reflects a shift towards more personalized and sophisticated attacks, targeting specific individuals with tailored messages. This trend indicates a growing need for advanced detection systems to identify subtle anomalies in email communications.

Looking ahead, experts predict that BEC attacks will become even more intricate, leveraging emerging technologies like artificial intelligence to automate and scale operations.

Organizations must stay ahead of these trends by investing in cutting-edge cybersecurity solutions and fostering a culture of employee awareness and vigilance. The future landscape of BEC will likely see a blend of traditional social engineering and innovative technological exploits, posing significant challenges for businesses worldwide.

Business Email Compromise FAQs

Detection of BEC attacks often involves monitoring for unusual email patterns, such as sudden changes in email volume, email addresses with slight variations from legitimate domains, and irregularities in email header information. Advanced network security tools and intrusion detection systems can be configured to flag these anomalies, but they also require continuous updating of detection rules to adapt to evolving BEC tactics.
A Zero Trust framework is particularly effective against BEC attacks. By requiring continuous verification of every user and device trying to access network resources with rigorous user authentication and access controls, Zero Trust minimizes the risk of unauthorized access. A Zero Trust approach is crucial for BEC prevention, as it ensures that access to sensitive data and financial systems is strictly controlled and monitored. This approach makes it much harder for attackers to exploit trusted relationships or hijack legitimate email communications for fraud.
After a BEC attack, take immediate steps to remove the attacker and remediate the user’s account. This may involve resetting the account password, refreshing tokens, updating MFA, or disabling active sessions. Notify relevant financial institutions to halt any unauthorized transactions. Conduct a thorough investigation to understand the breach's scope and report the incident to law enforcement. Review and update security protocols and conduct a post-incident analysis to prevent future attacks. If there is a risk of data disclosure, including sensitive PII and PHI, engage external data breach counsel as part of the steps outlined in your organization’s incident response plan.
Effective strategies include implementing advanced email filtering techniques, using AI/ML for anomaly detection, enforcing multi-factor authentication, and establishing stringent verification processes for financial transactions and data requests.
If you become aware of a recent BEC attack, notify your SOC immediately. You and your security team should also file a complaint with the FBI’s Internet Crime Complaint Center.
Several cybersecurity best practices can help you prepare for a BEC scam, such as implementing MFA, creating and reviewing an Incident Response Plan (IRP), assessing email platform security controls with Unit 42, running cybersecurity training modules, assessing your SOC, and more.