Business email compromise (BEC): A highly deceptive and destructive scam

August 2024

<p>Business email compromise (BEC): A highly deceptive and destructive scam</p>

Email has become the cornerstone of communication in the business world. Therefore, email is an increasingly appealing channel to cybercriminals. Over the past few years, a form of cyberattack known as business email compromise (BEC) has escalated in frequency and impact, causing significant financial and reputational damage to victim companies. 

close up of a keyboard

Business email compromise cost victims more than $2.3 billion in losses in 2023.

Source: FBI IC3’s Internet Crime Report 2023

Download this flyer to share with your employees.

 

What is business email compromise?

BEC involves email-based fraud schemes. Cybercriminals target businesses and then infiltrate or mimic certain employee email accounts with the intent of defrauding the company, or the external companies, clients, or organizations it does business with. The fraud victims can range from individuals to government organizations to businesses of all sizes.

BEC is a phased attack that may occur over the course of several weeks or months. It’s an especially deceptive scheme because the fraudster poses as a known contact, often a fellow employee or a supplier the victim already works with. The scheme can involve defrauding multiple victim companies — the company that was hacked and  external companies and individuals.

For example, a hacker may hack into a CEO’s email account to send an email to an accounts payable (AP) department employee requesting payment be sent to a “new vendor” account. Or, a hacker may hack into the email of a company‘s supplier and send routine payment requests with “new payment instructions” and provide payment details for a bank account that belongs to the hacker.

 

How BEC typically works:

Phase 1: Research and Reconnaissance

Hackers identify a target organization and gather information on employees, especially those in finance or executive positions. They choose a specific target, hack into their email, and learn their internal and external contacts, business routines, and communication style.

Phase 2: Email Takeover

Hackers either infiltrate or spoof the targeted employee’s email account, creating a visually similar duplicate.

Phase 3: Criminal Communications

Hackers use the account to send fake emails requesting payments or transfers to potential victims, who usually have financial authorization. The victims may include employees of the targeted company or its partners, suppliers, and clients. 

Phase 4: The Payment

The person receiving the fake email recognizes the email address and company name as a contact they do business with. Since it appears routine and legitimate, they perform the requested financial action.

 

BEC: A real-world scenario

One of the most challenging aspects of BEC is that it’s often months before the client realizes they’ve been a victim of fraud. To help clients avoid becoming victims, we remain committed to sharing details of the latest fraud schemes so you can more easily identify red flags and take the appropriate preventive measures. Here’s what happened in a recent situation where criminals used BEC to defraud a Key business client.

  • Our client received an email that appeared to be from one its vendors but was actually spoofed by a fraudster.
  • The email requested a payment that was large, but typical for the vendor. It stated that the vendor’s bank account information had changed and provided new payment instructions.
  • Since the email appeared to be from a known contact and requested a regularly occurring payment amount, our client authorized the payment without suspicion.
  • A few months later, the true vendor notified our client that they never received their regular payment.
  • Our client mentioned the new payment instructions, realized they had been defrauded, and contacted Key to submit a fraud claim.

In cases like this, KeyBank works diligently to try to recover the stolen funds. However, the more time that passes, the more difficult the money can be to recoup. 

 

Tips for protecting your business from BEC fraud

Remember, it only takes one employee being deceived by BEC to fulfill the hacker’s financial request and make your company a victim. To help your business avoid being defrauded by BEC schemes:

Ensure all employees, particularly those with financial authorization, understand how BEC works and know what to look for.

Enforce a strict policy only to alter payment instructions after speaking directly to the contact who requested the change and verifying the legitimacy of the request.

Require two levels of approval from AP-authorized employees for all outgoing payments. (You can adjust authorization settings in KeyBank payment systems.)

Be especially cautious of urgent payment requests and scrutinize emails that request any financial action, confirming the email addresses and domains are spelled correctly.

Review accounts frequently for suspicious transactions or unusual activity.

Enable AP automation to help secure payment processes, monitor activity and transactions, and authenticate vendors and payment requests.

Content provided for informational and educational purposes only and is in no way to be construed as financial, investment, or legal advice.  We cannot and do not guarantee their applicability or accuracy in regards to your individual circumstances. All examples are hypothetical and are for illustrative purposes. We encourage you to seek personalized advice from qualified professionals regarding all personal financial issues.

Let’s fight fraud. Together.


If you think your business has been exposed to BEC or other fraud, contact your banker or payments advisor, or call our Fraud Hotline at 1-800-433-0124. Dial 711 For TTY/TRS.

For more information about KeyBank’s core fraud solutions, contact your payments advisor or relationship manager or visit key.com/cybersecurity

 

Connect With Us

Find an Expert