Business Email Compromise
Protect your company from email fraudsters.
People First Since 1912
Keep Your Company Safe
Business email compromise (BEC) is a type of phishing scheme in which a fraudster attempts to trick an employee into transferring money or sensitive data. Commonly, executives, high-level employees, or well-known business associates will have their email spoofed or compromised in order to request a wire processor to conduct a fraudulent transaction. This crime is particularly stealthy because it employs social engineering techniques to manipulate users.
BEC is on the rise — and it’s often difficult to prevent because it’s very targeted. So what do you need to watch out for? Read below to learn more.
BEC is on the rise — and it’s often difficult to prevent because it’s very targeted. So what do you need to watch out for? Read below to learn more.
- According to the FBI’s 2017 Internet Crime Report, BEC and email account compromise (EAC) represented the highest reported losses — costing 15,690 victims more than $676 million. BEC often subverts detection because the transaction appears legitimate from the company’s perspective. Confirmation calls and other authentication mechanisms also typically reach the employee who submitted the legitimate request, making BEC even trickier to identify.
- The victims of BEC scams range from small businesses to large corporations, according to a public service announcement from the FBI. Victims also come from a variety of industries, with no one sector appearing to be a favored target. BEC is a profitable crime due to the nature of the targeted attacks.
- Tripwire reported that criminals do a lot of homework and seek a variety of information when targeting a victim, including:
- General information about the company (i.e., where and with whom it does business)
- Names and titles of company officers
- Management organizational structure
- Information about new rounds of funding
- Information about new products, services, and patents
- Product or geographic expansion plans
- Travel plans
According to the Internet Crime Complaint Center (IC3), BEC complaints share some common characteristics. Businesses that use open source email services are frequently targeted as are employees who handle wire transfers.
The scenario often plays out like this: An email arrives that appears to be from a high-level executive within the company — or even a business partner or company attorney. Since the email address has been spoofed, it appears to be legitimate. A request for a wire transfer is included in the email, which urges the recipient to take immediate action.
The scenario often plays out like this: An email arrives that appears to be from a high-level executive within the company — or even a business partner or company attorney. Since the email address has been spoofed, it appears to be legitimate. A request for a wire transfer is included in the email, which urges the recipient to take immediate action.
The fraudulent email might claim, for example, that a supplier requires prompt payment for a service rendered. IC3 reported multiple instances of fraudsters impersonating lawyers and reaching out to potential victims to handle supposedly confidential or time-sensitive matters.
Keep in mind: Requests for money might ultimately come via a phone call. While BEC is initiated over email, criminals can use various modes of communication to complete the fraud.
Keep in mind: Requests for money might ultimately come via a phone call. While BEC is initiated over email, criminals can use various modes of communication to complete the fraud.
Implement a comprehensive awareness program for employees that spells out the details of BEC and how to recognize potentially malicious emails. The program should train users to identify suspicious requests and cross-reference the sender’s email with the corresponding executive’s known address. Most importantly, employees should not reply to risky emails under any circumstances.
Set up an email gateway to flag keywords like “payment,” “urgent,” “sensitive” and “secret” — all of which are common in fraudulent emails. Companies should also register as many domains as possible that are slightly different from the legitimate company domain to minimize the risk of email spoofing. Company leaders should avoid using free, web-based email services. Instead, they should establish a company domain name and use it to create official company email accounts.
Set up an email gateway to flag keywords like “payment,” “urgent,” “sensitive” and “secret” — all of which are common in fraudulent emails. Companies should also register as many domains as possible that are slightly different from the legitimate company domain to minimize the risk of email spoofing. Company leaders should avoid using free, web-based email services. Instead, they should establish a company domain name and use it to create official company email accounts.
Make sure your employees are mindful of what they post on social media. Cybercriminals can appropriate seemingly benign information, such as birth dates, favorite foods, and places of residence to personalize their social engineering schemes.
Use caution when adding information to your company website. Teams should be aware that any job information posted on a company website can be used to facilitate targeted phishing scams, especially job descriptions, organizational charts, and out-of-office details.
Use caution when adding information to your company website. Teams should be aware that any job information posted on a company website can be used to facilitate targeted phishing scams, especially job descriptions, organizational charts, and out-of-office details.
Fraud Resource Center
Go back to the main Fraud Resource Center page.