Business Email Compromise (BEC)

What is it and how can we defend against it

Business Email Compromise (BEC) is a sophisticated cybercrime where attackers use email fraud to manipulate employees into transferring money or sensitive data to criminals.

Here's how it works:

Attackers typically impersonate executives, vendors, or trusted partners through spoofed or compromised email accounts. They exploit trust and authority to create urgency around fraudulent requests.

Common scenarios:

  1. CEO fraud: Fake executive emails requesting urgent wire transfers
  2. Vendor impersonation: Altered payment instructions from “suppliers”
  3. Account compromise: Hijacked employee accounts used to request gift cards or payroll changes
  4. Attorney impersonation: Fake legal requests for confidential data

Why it’s dangerous:

BEC attacks rely on social engineering rather than malware, making them harder to detect with traditional security tools. They exploit human psychology and organizational hierarchies.

Defences against Email Compromise:

Multi-factor authentication, payment verification procedures, security awareness training, and scrutinising unexpected requests – especially those involving money or data transfers.