Employee handling escalation of enterprise client complaints with empathetic communication at a unified resolution service center.
Service Recovery: The Secret to Brand Remaining Trusted Despite Problems
April 24, 2026
Customer Pain Points: Understanding What Really Bothers and Hinders Customers
April 24, 2026

Business Email Compromise (BEC): The Cyber Attack That Doesn’t Look Like One

April 24, 2026 / Published by: Admin

A finance manager gets an email from the CEO. The tone feels familiar. The subject line references a deal that’s been in the pipeline for weeks. The ask is simple: wire funds to a new partner account before end of day. Nothing seems off. The transfer goes through.

The next morning, she mentions it to the CEO in passing. He has no idea what she’s talking about. He never sent that email.

This isn’t a rare edge case. The FBI’s Internet Crime Complaint Center recorded over $2.9 billion in losses attributed to Business Email Compromise in 2023 alone, making it the costliest form of cybercrime globally. No malware was deployed. No systems were breached. Just an email that looked completely normal.

That’s the point. BEC doesn’t attack your infrastructure. It attacks your trust.

What Is Business Email Compromise?

Business Email Compromise is a social engineering attack where someone impersonates a trusted party; an executive, a vendor, a legal counsel to manipulate employees into wiring money or handing over sensitive data. No malicious links. No infected attachments. Just an email that looks legitimate.

Picture this: you receive a message that appears to come from your regular supplier. It references the project you’re both working on, uses the right terminology, and asks you to update your payment details because of “a bank processing issue.”

Nothing raises a flag. Until the payment clears and you call the actual supplier.

Is BEC the Same as Phishing?

They’re related, but they work very differently. Standard phishing casts a wide net. One message goes to thousands of recipients, carrying a malicious link or attachment, and succeeds on volume alone.

BEC is the opposite: one organization is studied in depth before a single message is sent. No links. No attachments. No technical fingerprint that security tools can catch.

 Standard PhishingBEC
TargetingMass, undifferentiatedSpecific individual or organization
MethodMalicious links or attachmentsSocial engineering only
GoalSteal credentials, spread malwareWire fraud, sensitive data
Technical indicatorsYes (URLs, file hashes)Essentially none
Average loss per incidentRelatively lowTens of thousands to millions

How BEC Works

BEC isn’t improvised. There’s a sequence attackers follow before they ever hit send, and understanding it matters because every stage is also an opportunity to stop them.

Stage 1 -Reconnaissance: Learning Everything About You

Before the attack begins, attackers collect as much information as possible. LinkedIn tells them who the CFO is and who reports directly to her. The company website names the executive team. Press releases mention ongoing deals. Job postings reveal internal tooling. A patient attacker can build a detailed picture of your org from entirely public sources.

Example: just from a company’s LinkedIn page, an attacker can identify the finance director, learn which vendors the company works with, and figure out which employees have payment authorization. That’s enough to write an email that feels deeply personal.

Stage 2 – Impersonation: Building a Convincing Identity

Once they have enough context, attackers build a credible identity. This usually means registering a domain that looks nearly identical to the real one (think company-corp.com instead of company.com), or, in more serious cases, compromising a real account whose credentials were leaked somewhere else.

Example: an attacker registers invoicing-vendorname.co because the real vendor uses invoicing-vendorname.com. One character difference. Most people don’t check the full domain when they’re reading quickly.

Stage 3 – Execution: Striking at the Right Moment

Attackers don’t send messages at random. They pick moments when vigilance is lowest: late Friday afternoon, when the executive “making the request” is listed as traveling, or right when a vendor payment deadline is coming up.

Example: a request to “wire before COB today” that arrives on the exact day a vendor invoice is due is far more likely to get acted on without a second look.

Stage 4 – Monetization: The Money Moves Fast

This is the part most people don’t think about, and it’s why recovery is so rare. The moment a transfer goes through, attackers move the funds immediately through a chain of intermediary accounts, often across multiple countries. By the time the victim contacts their bank, the money is already three accounts removed.

Example: funds wired at 2 PM can pass through accounts in two different countries before business closes that day. Calling the bank the next morning, even if you act fast, often comes too late.

Types of BEC Attacks

The goal is always the same. The approach changes depending on what the attacker learned about the target. These are the four variants that appear most often in FBI reporting.

CEO Fraud

An attacker poses as a senior executive and contacts someone in finance with an urgent request to transfer funds. The message usually comes with a plausible business reason and a note asking the recipient not to discuss it with others yet.

Example: a finance team member receives an email “from the CEO” who is reportedly traveling, requesting a $150,000 wire to a new partner to close a deal that needs to happen today.

Vendor Impersonation

The attacker poses as an existing vendor and sends updated banking details, usually framed as a routine account change. Because the vendor relationship already exists, nothing about the request feels suspicious.

Example: a supplier who invoices $40,000 monthly sends an email with “updated payment instructions.” Without a quick phone verification, the next payment goes straight to the attacker’s account.

Email Account Compromise (EAC)

This is the most dangerous variant. Rather than building a fake identity, attackers access a real compromised account. Every message comes from a legitimate address, so there’s nothing technically suspicious for security tools to flag.

Example: a CFO’s credentials leaked in a third-party data breach. The attacker logs in, monitors communication patterns for two weeks, then sends wire instructions from the real CFO account.

Employee Data Theft

Attackers target HR with requests for sensitive employee records — payroll data, tax information, social security numbers. The data is either sold or used for follow-on identity fraud.

If records like payroll data, tax filings, or employee IDs are exposed, the company can face legal liability, mandatory breach notification, and reputational damage under applicable Indonesia’s data protection regulations (UU PDP).

Example: someone posing as a senior executive emails HR requesting a spreadsheet of employee compensation and tax data, citing an urgent compliance audit.

Why BEC Is So Hard to Detect

Most cyber threats leave something behind that can be analyzed: a suspicious file, a link to a flagged domain, a sender on a blocklist. Conventional email security tools work by matching those technical signals. BEC doesn’t produce them.

BEC Emails Contain No Malware or Malicious Links

Most BEC messages are plain text. No attachment to scan. No URL to run through a reputation checker. No code executing in the background. There’s simply nothing for a security system to inspect.

Think of it this way: a security guard can stop someone carrying a weapon. They can’t stop someone who walks in wearing a visitor badge, greets the receptionist by name, and heads straight to the right floor. A BEC email is that second person.

Attackers Use Business Context You’d Recognize

Automated filters flag unusual patterns: unknown senders, suspicious keywords, unfamiliar formatting. BEC inverts all of those assumptions. Attackers use names you know, reference projects that are real, and mirror the communication style your org already uses.

Real example: an attacker who spent three weeks monitoring internal email threads knew a company was finalizing a contract with a specific vendor. They sent a message claiming to be that vendor, requesting a payment account change “due to an internal audit.”

Every contextual detail was accurate. Nothing looked wrong.

The Email Reads Like Your Colleague Actually Wrote It

Context alone isn’t always enough to fool someone. What makes BEC particularly convincing is when attackers replicate the writing style of the person they’re impersonating: how formal they are, whether they sign off with their full name or just initials, whether they use full sentences or short bursts.

Example: after monitoring an executive’s inbox for two weeks, an attacker knows she writes in short sentences, rarely uses a greeting, and often sends instructions without explanation. When the fake request arrives, it reads exactly like her. Nobody’s instincts fire.

Can a Secure Email Gateway (SEG) Block BEC?

Secure Email Gateway tools like Proofpoint, Mimecast, or Microsoft Defender for Office 365 are built to filter malicious email based on domain reputation, malware signatures, and suspicious URL patterns. Against BEC, their effectiveness has real limits.

A well-configured SEG can catch some signals: domains that look similar but aren’t identical, inconsistent email headers, or senders not in the internal directory.

But when attackers use aged domains with clean reputations, or worse, when they’ve already taken over a legitimate account, the gateway has nothing to act on.

That’s not a product failure. It’s an architectural one. SEGs analyze technical signals. BEC operates at the layer of human trust. Those two things don’t meet in the same place.

How to Spot a BEC Email Before It’s Too Late

Detection depends more on trained human instinct than automated systems. Certain patterns show up consistently in BEC attempts, and the people handling financial transactions or sensitive data need to recognize them reflexively.

Here are the most common signs found in BEC emails:

  • Manufactured urgency: “Wire before COB today” with no verification step is a classic setup. Urgency is engineered to bypass normal procedure.
  • Sudden payment instruction changes: A vendor suddenly wants payment sent to a new account, citing “a bank issue” or “account update.”
  • Requests arriving through unusual channels: An executive who normally uses Slack is now sending wire instructions via personal email.
  • Domains that are almost right: One transposed letter, or .co instead of .com, easily missed in a quick scan.
  • Requests for secrecy: Any email asking you “not to mention this to anyone yet” is a clear warning sign.

How to Prevent BEC in Your Organization

Preventing BEC requires layered controls. No single measure is enough because the attack operates across two surfaces at once: technical and human. Here’s what organizations can put in place.

1. Enable Multi-Factor Authentication on all email accounts

EAC, the variant where attackers use real compromised accounts, is the most damaging form of BEC. MFA (Multifactor Authentication) stops unauthorized access even when credentials have been stolen.

Even if an attacker obtains the CFO’s password through a data breach, they still can’t get in without the verification code on her device.

2. Require two-channel verification for transfers above a set threshold

Confirmation should happen via a phone call to a number already on file, not a number listed in the request email.

Example: any wire request over $5,000 gets a callback to a registered contact before it’s processed, regardless of how convincing the email is.

3. Run regular simulated BEC attacks

Theory-based training doesn’t build real instincts. Sending fake BEC emails to employees and tracking who acts on them without verifying creates direct, memorable learning.

Example: the IT team sends a message mimicking the CEO asking for an urgent wire. Employees who respond without checking get targeted follow-up coaching; those who flag it have demonstrated real awareness.

4. Configure DMARC, DKIM, and SPF on your domain

These protocols make it much harder for attackers to spoof your domain in emails to external parties. Without them, someone can send a message that appears to come from your company’s real domain to your vendors or partners.

Example: an attacker tries to send invoice@yourcompany.com to a vendor requesting a payment redirect. With DMARC active, the vendor’s mail server rejects or quarantines the message before it’s read.

5. Create a clear escalation procedure for unusual requests

Employees need to know that questioning a suspicious instruction is expected behavior, not insubordination.

Example: any request to change a vendor’s payment details requires sign-off from two separate people, whatever the dollar amount.

6. Monitor email login activity for anomalies

Logins from unknown devices or unusual locations should trigger an automatic alert, especially for executive and finance accounts.

Example: if the CFO’s account logs in from a city she’s not visiting, that session should require verification before the account can send anything.

7. Make employees your last line of defense, not just an audience for training

Technical controls protect systems. Employees are the ones who actually read the emails.

Give them a simple, memorable rule they can actually use: any payment request or account change that arrives via email requires confirmation through one separate channel before anything is processed. No exceptions, no matter how convincing the message is.

BEC is just one form of modern cyber threat that exploits human vulnerabilities and access. The following eBook can serve as a reference for understanding more comprehensive business protection strategies.

Conclusion

BEC is a reminder that security isn’t purely a technology problem. The best-configured systems can still be bypassed when the attack targets people, not software.

What makes this threat hard to address with any single control is that it adapts. Attackers impersonate the CEO today, a vendor tomorrow, and use a compromised real account the day after. Every iteration is designed to get past whatever defense was put up last time.

An effective response has to cover all four layers: strict verification policies, ongoing employee training, proactive access monitoring, and solid email authentication configuration. Not as separate initiatives, but as one connected posture.

Most BEC victims aren’t caught off guard because they didn’t know the threat existed. They knew. What they didn’t have was a procedure strong enough to survive one moment of distraction. That’s the gap between a company that almost got hit and one that wired the funds.

If you’re evaluating your organization’s readiness against social engineering threats like BEC, Adaptist Prime is a good place to start that conversation.

Ready to Manage Digital Identities as a Business Security Strategy?

Request a demo today and discover how IAM solutions centralize user logins through Single Sign-On (SSO), automate employee onboarding, and protect company data from unauthorized access without disrupting productivity with repeated logins.

FAQ

What’s the difference between BEC and regular phishing?

Phishing targets large groups with generic messages, relying on volume. BEC targets a specific organization after attackers research its structure and processes, which is why it’s far harder to recognize.

Does BEC only target large enterprises?

No. Mid-size and small businesses are often more vulnerable precisely because their internal controls are less formal and financial verification procedures are less strict.

What should we do if we’ve already been hit?

Contact your bank immediately to request a wire recall, the recovery window is usually under 72 hours. In parallel, report the incident to the FBI’s IC3 (ic3.gov) and document every piece of communication involved for the investigation.

Can email encryption prevent BEC?

No. BEC doesn’t intercept existing messages, it creates new ones designed to look legitimate. Encryption protects data in transit; it does nothing against manipulation built on trust.

How often does BEC involve a real compromised account?

Often enough to matter. The EAC variant, where attackers send messages from a genuine account they’ve taken over, accounts for the largest financial losses in the BEC category according to FBI data, precisely because it leaves no technical indicators behind.

Profil Adaptist Consulting

Adaptist Consulting is a technology and compliance firm dedicated to helping organizations build secure, data-driven, and compliant business ecosystems.

Read Related Post