TLDR
Business Email Compromise (BEC) is when an attacker impersonates a company executive, vendor, or business partner via email to trick employees into transferring money or sensitive data. The FBI reports BEC caused $2.7 billion in losses in a single year, making it the highest-dollar cybercrime category. Unlike mass phishing, BEC targets specific individuals with customized emails.
How BEC Differs from Regular Phishing
| Feature | Mass Phishing | BEC |
|---|---|---|
| Target | Thousands of random people | Specific individual at a company |
| Personalization | Generic ("Dear Customer") | Uses real names, roles, projects |
| Goal | Steal login credentials | Wire transfer or data theft |
| Technical sophistication | Fake website + link | Email spoofing or account compromise |
| Average loss | $200-$500 per victim | $125,000+ per incident |
| Volume | Millions of emails | One carefully crafted email |
The Five BEC Attack Types
Type 1: CEO Fraud
The attacker impersonates the CEO or CFO and emails a finance team member:
"I need a wire transfer processed today for an acquisition we are closing. This is confidential - do not discuss with others. I'll send the details shortly."
The urgency, authority, and secrecy prevent the employee from verifying through normal channels.
Type 2: Vendor Invoice Manipulation
The attacker compromises or spoofs a vendor's email and sends a modified invoice with the attacker's bank account details:
"Please note our banking information has changed. All future payments should be directed to the following account..."
Type 3: Account Compromise
An employee's actual email account is compromised (often through phishing). The attacker monitors emails, learns business patterns, and then sends requests from the real account.
Type 4: Attorney Impersonation
The attacker poses as a law firm handling a time-sensitive legal matter:
"This is regarding a confidential legal matter. We need an immediate wire transfer to hold funds in escrow. Time is of the essence."
Type 5: Data Theft
Instead of requesting money, the attacker asks HR for employee W-2 forms, payroll data, or personally identifiable information.
The Domain Infrastructure
ScamVerify™ URLhaus data reveals which domain types are used in BEC infrastructure:
| TLD | Malicious Domains | BEC Relevance |
|---|---|---|
| .com | 59,876 | Most common for spoofed business domains |
| .org | 3,996 | Used for institutional/nonprofit impersonation |
| .net | 4,000 | Used for IT/technology vendor impersonation |
The 3,996 malicious .org domains are particularly relevant to BEC because .org carries an institutional credibility signal. An email from legal@company-name.org appears more authoritative than the same from a .com or other TLD.
BEC attackers also register lookalike domains: company-name.com vs cornpany-name.com (m replaced with rn) or company-narne.com (n and r swapped).
Red Flags for BEC
- Urgent wire transfer request from a senior executive
- "Keep this confidential" or "do not discuss with others"
- Changed banking details from a known vendor
- Email sent outside normal business hours or from an unusual device
- Slight variation in email address (one character different from the real address)
- Pressure to bypass normal approval processes
- Reply-To address that differs from the From address
How to Protect Your Business
Technical Controls
- Enable DMARC with a
rejectpolicy on your domain - Configure SPF to authorize only your legitimate sending servers
- Enable DKIM signing for all outbound email
- Require two-factor authentication on all email accounts
- Use email security tools that flag external emails and lookalike domains
Process Controls
- Dual authorization for all wire transfers above a threshold
- Verbal verification (call the requester on a known number) for any change in payment details
- Out-of-band confirmation for any unusual financial request, regardless of who it appears to come from
- Training for all employees who handle financial transactions or sensitive data
FAQ
Why is BEC so much more expensive than other scams?
BEC targets businesses with significant financial resources and the ability to move large sums quickly. A single successful BEC attack on a mid-size company can net $100,000 or more. The FBI reported one case involving a $60 million fraudulent transfer.
Can email authentication (SPF/DKIM/DMARC) prevent BEC?
It helps significantly but does not eliminate the risk. DMARC prevents direct domain spoofing (someone sending as your-company.com from an unauthorized server). However, attackers can register lookalike domains (your-cornpany.com) and configure proper authentication on those domains. Use ScamVerify's email checker to analyze suspicious emails.
What should I do if my company falls victim to BEC?
- Contact your bank immediately to request a wire recall (time is critical - within 24 hours)
- File a complaint with the FBI's IC3 (ic3.gov)
- Contact your insurance provider if you have cyber insurance
- Preserve all email evidence
- Engage a cybersecurity firm to investigate the compromise