vade_combination_HSE_white_WEB2023-12-22
vade_combination_HSE_color_WEB2023-12-22
  • Products
    • M365
      • 365 Total Protection
      • 365 Permission Manager
      • 365 Total Backup
      • AI Recipient Validation
      • Security Awareness Services
      • Vade for M365
    • Email Security
      • Comprehensive Email Security
      • Hornet.email
      • Vade for M365
      • Vade for Google Workspace
      • Vade Cloud
    • Training
      • Security Awareness Services
  • Technology
    • Technology
      • Anti Malware / Ransomware
      • Anti Phishing
      • Anti Spam
      • Anti Spear Phishing BEC
      • Incident Response
      • Threat Intel & Investigation
      • User Awareness Training
      • Remote Browser Isolation
      • Content Filter
      • IsItPhishing
      • MTA Builder
  • Solutions
    • Solutions by Business
      • Vade for MSPs
      • Vade for SMBs
      • Vade for ISPs, ESPs & Telcos
  • Partners
    • Become a Partner
      • Program Overview
      • Register
      • Vade Partner Portal Login
  • Resources
    • Resources
      • Resource Center
      • Blog
      • Events
      • Threat Tools
    • Continued Learning
      • Email Security
      • Phishing
      • Spear Phishing
      • Cybersecurity Glossary
  • Company
    • About
    • Our CSR commitments
    • Career
    • Contact
    • News
    • Support
Request a demo ›
  • EN
    • FR
    • 日本

What is Business Email Compromise (BEC)?

Table of contents

—
What is Business Email Compromise (BEC)?
Examples of business email compromise
Consequences of a BEC attack
How to protect your business against BEC
Read more on business email compromise
—

Vade - email security best practices

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is a type of spear phishing attack in which a person impersonates a well-known contact of an employee in an attempt to have them transfer funds, reveal sensitive information, or carry out other harmful actions.

See the official definition given by the FBI website here: Business email compromise.

Examples of business email compromise

BEC scams and how to prevent them

BEC typically targets a single individual, usually someone who has influence within the organization or directly manages the budget. A successful attack relies on the targeted individual engaging with a seemingly legitimate email from an internal supervisor or colleague, or an external partner or vendor, and either clicking a link or providing login credentials to the perpetrator.

Although it comes in many forms, some common examples of business email compromise include:

Gift card fraud: In this attack, the hacker asks an employee to purchase gift cards for staff or customers. Often, the hacker will ask for secrecy and direct the employee to send screenshots of the back of the gift cards, rather than the actual gift cards.

CEO fraud: One of the most expensive forms of business email compromise, this attack involves CEO or executive impersonation. Again, the hacker will ask for secrecy and urge the employee to take some kind of action, usually financially. In many cases, the hacker will ask the employee to wire a large sum of money.

Vendor compromise: In this attack, a hacker compromises a vendor’s account and then uses that account to phish or spear phish the vendor’s customers. This is a popular scheme that allows hackers to receive a quick payout from victims who believe they are paying vendor invoices.

Tax fraud: In this scheme, a hacker typically impersonates an employee and reaches out to a member of an HR team, requesting a copy of a W2 or other income statement form.

Consequences of a successful BEC attack

Between 2019 and 2021, the FBI reported that global exposed losses from BEC attacks increased by 65 percent. This equates to $43 billion in losses in less than three years. Naturally, the financial losses of a successful BEC attack are what drive most organizations to take preventative action.

Often overlooked consequences include damaged consumer trust, as well as a diminished brand reputation. When word gets out that your company’s security posture isn’t adequate, prospective clients won’t hesitate to look elsewhere for assistance.

Protecting your business against Business Email Compromise

In order to minimize the likelihood of your organization falling prone to business email compromise, educate your employees on BEC awareness and prevention. An effective cybersecurity awareness training program can help build a culture of cyber vigilance and risk mitigation. On top of that, implementing anti-spear phishing solutions that use a core set of AI technologies like Natural Language Processing and sender spoofing algorithms can help safeguard against spear-phishing attacks and strengthen your front-line defenses.

Read more on Business Email Compromise

BEC Scam: How to Avoid Becoming a Victim
Beware the Business Email Compromise


About Vade

isitphishing-threat-detection

Vade’s spear phishing prevention technology uses artificial intelligence, including Anomaly Detection and Natural Language Processing, to identify impersonation attempts and malicious patterns in spear phishing emails.

Learn more about Vade Anti BEC >

  • M365
    • 365 Total Protection
    • 365 Permission Manager
    • 365 Total Backup
    • AI Recipient Validation
    • Security Awareness Services
    • Vade for M365
  • Email Security
    • Comprehensive Email Services
    • Vade for M365
    • Vade for Google Workspace
    • Vade Cloud
  • Partners
    • Learn More
    • Partner Portal
    • Support
  • Resources
    • Resources Center
    • Blog
    • Events
    • Threat Tools
    • Email Security
    • Phishing
    • Spear-Phishing
    • Cybersecurity Glossary
  • Company
    • About
    • Our CSR Commitments
    • Career
    • Contact
    • News
  • Sitemap
  • Privacy
  • Disclosure Policy
  • Legal Notice
  • Cookie policy
  • Conditions of use
  • © Vade 2023