What is Business Email Compromise (BEC)?
Business Email Compromise, or BEC, refers to targeted fraud where attackers use a compromised or impersonated email account to deceive businesses into transferring money, changing bank details, or divulging confidential information. Unlike spam or generic phishing attempts, BEC is highly sophisticated, often leveraging detailed knowledge of business workflows to seem credible.
For instance, a BEC attack might involve a fraudster impersonating a senior executive, sending an urgent email to a finance team requesting an immediate wire transfer to a fraudulent bank account. Given its precision and focus, BEC attacks result in significant financial losses globally.
How Business Email Compromise Attacks Work
BEC attacks typically follow a structured flow:
- Reconnaissance: Attackers gather information on targets, such as the names, roles, and email patterns of executives or vendors.
- Email Compromise or Impersonation: Fraudsters either hack into real accounts (account takeover) or create lookalike domains (e.g., replacing "example.com" with "examp1e.com").
- Social Engineering: Manipulative messages are crafted to target employees or partners, often invoking urgency or secrecy.
- Deception: Requests may involve fake payment instructions or bank change requests.
- Cover-up: Fraudsters delete emails or employ inbox rules to evade detection.
For example, a CFO might receive an email from what appears to be the CEO requesting an “urgent wire transfer” for a supplier to a new bank account.
Common Business Email Compromise Scenarios
Fraudsters utilise various schemes to exploit vulnerabilities and manipulate workflows:
- Invoice Diversion: Attackers intercept payments by substituting real invoices with falsified versions containing fraudulent bank details.
- CEO/Finance Impersonation: Fraudsters fabricate high-pressure, time-sensitive requests for wire transfers disguised as company executives.
- Payroll Diversion: Employee email accounts are hacked, and direct deposit details are altered to redirect salaries to attacker-controlled accounts.
- Supplier/Client Fraud: Attackers infiltrate legitimate vendor or client email accounts to send fraudulent transaction requests.
- Third-Party Mailchain Compromise: Fraudsters gain access to suppliers’ real email accounts and insert themselves undetected into ongoing payment conversations.
BEC vs Phishing
Although phishing and BEC share overlaps, they differ in intent and impact:
- Phishing: Typically broad, aiming to capture credentials or distribute malware to unknown victims.
- BEC: A targeted attack exploiting relationships and specific business workflows for high-value payouts.
For instance, phishing may involve sending a mass email containing malicious links, while BEC targets an employee involved in finance with tailored fake invoices. Despite the absence of phishing-style malware in BEC, its damage can be equally catastrophic due to direct financial loss.
Warning Signs of Business Email Compromise
Identifying red flags in emails is the first step to detecting BEC schemes:
- Email display names mismatched with reply-to addresses.
- Subtle changes in email domains, such as replacing letters with numbers.
- Requests emphasising urgency or confidentiality (e.g., “This must be done immediately”).
- Sudden, unverified bank account changes for vendor payments.
- Employee inbox rules that automatically forward emails to external unknown addresses, signalling account compromise.
Staying vigilant to these signs helps prevent falling prey to BEC scams.
How to Prevent Business Email Compromise
Effective BEC prevention involves combining technology, processes, and education:
- Process Verification:
a. Implement call-back verification for payment or account changes.
b. Require dual approvals for significant transfers or amendments to supplier details. - Authentication Controls:
a. Enforce Multi-Factor Authentication (MFA) for email accounts.
b. Restrict admin privileges to critical staff only. - Email Security Features:
a. Use domain-based email authentication such as SPF, DKIM, and DMARC protections.
b. Employ solutions that flag variations in reply-to fields and detect impersonation attempts. - Employee Training:
a. Provide scenario-based training tailored for finance departments to recognise manipulative emails or pressure tactics. - Limiting Privileges:
a. Lock sensitive payment systems to authorised personnel.
Advanced detection measures, such as solutions supported by artificial intelligence, can identify anomalous patterns in email usage, adding another layer of defence against these attacks.
Detection and Response: What to Do When BEC Happens
If a BEC attack is detected, take these critical steps to mitigate its impact:
- Immediate Actions:
a. Halt pending payments and contact relevant banks to block transactions.
b. Preserve digital evidence by securing emails, timestamps, and related communications. - Internal Coordination:
a. Notify Security, Finance, and Legal teams.
b. Inform any affected parties, including impacted vendors or customers. - Reinforce Measures:
a. Reset compromised credentials and fix any mailbox rules set by the attacker.
b. Conduct a thorough audit of all active supplier and customer accounts.
To improve response readiness, regular scenario exercises can prepare teams to handle incidents effectively.
Why BEC Is a Financial Crime Risk
BEC attacks sit at the intersection of various fraud types:
- Payment Fraud: Redirecting funds or misdirected business payments is the most common outcome.
- Invoice Fraud: Attackers often swap bank details in invoices to funnel payments into fraudulent accounts.
- Account Takeovers: Compromising accounts aids BEC schemes by adding legitimacy to fake payment requests.
Effective KYC verification and counter-fraud solutions complement internal payment approval processes, mitigating these risks while ensuring robust compliance measures.
LSEG’s Approach to Managing BEC Risk
While no organisation can eliminate all risks, leveraging solutions to mitigate them significantly reduces exposure. LSEG World-Check One screening platform and advanced identity verification capabilities help organisations identify key vulnerabilities and respond to risks confidently. These solutions work by detecting anomalies and flagging attempts linked to common BEC tactics. Furthermore, AI-driven capabilities within these systems assess compromised accounts and alert against unusual activity.
Conclusion
While no organisation can eliminate all risks, leveraging solutions to mitigate them significantly reduces exposure. LSEG World-Check One screening platform and advanced identity verification capabilities help organisations identify key vulnerabilities and respond to risks confidently. These solutions work by detecting anomalies and flagging attempts linked to common BEC tactics. Furthermore, AI-driven capabilities within these systems assess compromised accounts and alert against unusual activity.
FAQs
Request details
Email your local sales team
Call your local sales team
Americas
All countries (toll free): +1 800 427 7570
Brazil: +55 11 47009629
Argentina: +54 11 53546700
Chile: +56 2 24838932
Mexico: +52 55 80005740
Colombia: +57 1 4419404
Europe, Middle East, Africa
Europe: +442045302020
Africa: +27 11 775 3188
Middle East & North Africa: 800035704182
Asia Pacific (Sub-Regional)
Australia & Pacific Islands: +612 8066 2494
China mainland: +86 10 6627 1095
Hong Kong & Macau: +852 3077 5499
India, Bangladesh, Nepal, Maldives & Sri Lanka:
+91 22 6180 7525
Indonesia: +622150960350
Japan: +813 6743 6515
Korea: +822 3478 4303
Malaysia & Brunei: +603 7 724 0502
New Zealand: +64 9913 6203
Philippines: 180 089 094 050 (Globe) or
180 014 410 639 (PLDT)
Singapore and all non-listed ASEAN Countries:
+65 6415 5484
Taiwan: +886 2 7734 4677
Thailand & Laos: +662 844 9576