Business Email Compromise (BEC)
What is it and how can we defend against it
Business Email Compromise (BEC) is a sophisticated cybercrime where attackers use email fraud to manipulate employees into transferring money or sensitive data to criminals.
Here's how it works:
Attackers typically impersonate executives, vendors, or trusted partners through spoofed or compromised email accounts. They exploit trust and authority to create urgency around fraudulent requests.
Common scenarios:
- CEO fraud: Fake executive emails requesting urgent wire transfers
- Vendor impersonation: Altered payment instructions from “suppliers”
- Account compromise: Hijacked employee accounts used to request gift cards or payroll changes
- Attorney impersonation: Fake legal requests for confidential data
Why it’s dangerous:
BEC attacks rely on social engineering rather than malware, making them harder to detect with traditional security tools. They exploit human psychology and organizational hierarchies.
Defences against Email Compromise:
Multi-factor authentication, payment verification procedures, security awareness training, and scrutinising unexpected requests – especially those involving money or data transfers.