What is BEC?
Common Types of Business Email Compromise Scams
1. CEO Fraud
Attackers impersonate the CEO or high-ranking executive to hurry along ostensibly urgent, confidential wire transfers or requests for sensitive information.
2. Account Compromise
A company’s email account is compromised and used to send payment requests to vendors in its address book.
3. Data Theft
4. Attorney Impersonation
Hackers pose as an attorney or lawyer, pretending to handle confidential or time-sensitive matters.
5. Invoice Fraud
Phishing and Spoofing in BEC
Phishing
The attackers send e-mails that seem to come from a trusted source and deceive the victim into divulging sensitive information or clicking on harmful links. The e-mails usually mimic actual messages, so they can be hard to detect.
Spoofing
BEC in Action - What are the Mechanics?
Research
Grooming
Building rapport with the target. This is often accomplished through a phishing email to lower down the victim’s defenses.
Execution
The perpetrator sends a persuasive e-mail which appears to be coming from a reputable source that either seeks funds or confidential information.
Exfiltration
BEC’s Potential Pitfalls in Businesses
Financial Loss
Companies can lose a lot of money, sometimes millions, in fake wire transfers.
Reputation Damage
Being a victim of BEC can damage the reputation of a company and reduce customer trust.
Legal Consequences
How To Prevent BEC Scams?
Employee Training
Email Security
Email Verification Procedures
This includes multi-factor authentication (MFA) and phone calls for unusual requests. This can help prevent unauthorized transactions.