What is business email compromise (BEC)?
Business email compromise
GoSentrix Security Team
Major Takeaway
Key insight: Business email compromise is a targeted cyberattack where criminals impersonate someone you trust—like your CEO, a vendor, or a business partner—to trick you into sending money or revealing confidential information.
Table of Contents
Business Email Compromise (BEC) is a form of highly targeted cybercrime where attackers use email fraud to trick an organization into sending money, revealing sensitive information, or granting unauthorized access. Unlike broad phishing campaigns, BEC attacks are precise, personalized, and often involve social engineering rather than malware, making them difficult to detect with traditional security tools.
BEC is one of the most financially damaging cyberattacks globally. The FBI has repeatedly reported billions of dollars in losses each year because attackers exploit trust, authority, and workflow gaps — not technical vulnerabilities.
How BEC Works
BEC attacks typically follow a pattern:
1. Reconnaissance
Attackers gather public or leaked information about:
- Company structure
- Executives and employees
- Vendors and partners
- Financial workflows
- Travel schedules
This allows them to craft believable messages.
2. Email Account Spoofing or Hijacking
Attackers may:
- Spoof a legitimate-looking domain (e.g., ceo-company.com vs company.com)
- Gain access to a real employee’s mailbox via credential theft
- Register similar domains to impersonate vendors or executives
Once inside a real mailbox, attackers quietly monitor conversations before striking.
3. Social Engineering Manipulation
Attackers craft targeted messages such as:
- “Please wire this urgent payment.”
- “Can you update this vendor’s bank account?”
- “I need the employee W-2 files immediately.”
- “I’m traveling — please handle this confidentially.”
These messages use:
- Authority (CEO/CFO impersonation)
- Urgency
- Confidentiality
- Familiar language styles
4. Execution of Fraudulent Action
Victims are tricked into:
- Sending wire transfers
- Changing banking details
- Paying fraudulent invoices
- Sharing employee data
- Sending confidential documents
- Granting access to systems
Because the request appears legitimate, humans — not security tools — are often the weak link.
Common Types of BEC Attacks
1. CEO / Executive Impersonation
Attacker pretends to be a CEO or CFO and sends an urgent financial request to an employee.
2. Vendor Email Compromise
Attackers compromise a supplier’s email and send altered invoices to customers.
3. Payroll Diversion
Attackers trick HR or payroll into redirecting employees’ direct deposits.
4. Attorney / Legal Impersonation
Attackers impersonate lawyers or law firms and request sensitive financial data during a supposed legal process.
5. Data Theft Targeting HR
Often used as a precursor to deeper financial fraud (W-2 data, SSNs, employee records).
Why BEC Is So Effective
- No malware required — often bypasses antivirus and traditional security tools.
- Exploits human trust, not technical vulnerabilities.
- Uses familiar conversation patterns (previous email threads, spoofed signatures).
- Highly targeted — no mass phishing signals to detect.
- Appears legitimate, especially when coming from an actual compromised email account.
This makes BEC incredibly difficult to detect without layered controls.
Warning Signs of a BEC Attack
- Unexpected urgent payment requests
- Changes to vendor or banking details
- Requests to keep communication “confidential”
- Messages sent outside normal business hours
- Slight variations in sender email address
- Poor or inconsistent grammar (not always present)
- Unusual tone or communication style
- Requests to bypass normal procedures
How to Protect Against BEC
1. Implement Strong Email Security
- DMARC, SPF, DKIM
- Advanced phishing and impersonation detection
- Behavioral analytics to detect anomalous logins
2. Enforce Multi-Factor Authentication (MFA)
Prevents account takeover even if credentials are stolen.
3. Require Out-of-Band Verification
For:
- Wire transfers
- Vendor banking changes
- High-sensitivity requests
Phone verification alone prevents most BEC losses.
4. Educate Employees
Teach teams to identify:
- Authority-based manipulation
- Urgency pressure
- Email spoofing
5. Monitor for Compromised Accounts
Use anomaly detection:
- Suspicious mailbox rules
- Forwarding rules
- Impossible travel logins
6. Deploy Financial and Payment Controls
- Dual-authorization for payments
- Strict vendor management processes
- Audit trails for financial actions
What To Do If You Fall Victim to a BEC Attack
- Immediately contact your bank’s fraud department.
- Request a recall of the wire transfer.
- File a report with the FBI’s Internet Crime Complaint Center (IC3).
- Reset credentials and apply MFA.
- Review compromised mailboxes for persistence rules.
- Conduct internal and external forensics.
Rapid action within the first 24–48 hours drastically increases the chance of recovering funds.
Conclusion
Business Email Compromise is not a technical exploit — it’s a psychological one.
Because BEC leverages trust, authority, and human behavior, it is:
- Hard to detect
- Easy to execute
- Extremely costly
- Growing globally every year
By combining strong email policies, employee education, MFA, verification workflows, and continuous monitoring, organizations can dramatically reduce their risk.