2022's best place for Cybersecurity Insights and Advice for Everyone

#1 - Signup to our list and get regular insights and advice on how to be cyber safe.

By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.

What is Business Email Compromise (BEC)

by Cybergal | Last Updated | May 15, 2022
CyberSecurity - SMB

Attacks on business email are notoriously tough to prevent.

Instead of using malware, the culprits use social engineering and impersonation to persuade individuals to act on the attacker’s request.

These attack tactics are frequently missed by traditional threat detection technologies that examine email headers, links, and metadata.

How Serious is Business Email Compromise (BEC)?

Business email compromise is one of the most financially destructive cyber crimes. These are emails that appear to be sent by known or trusted sources asking for something legitimate. A BEC scheme may be a payment request from a business or supplier. It may also be a gift card request from seemingly high-ranking executives. 

Business email compromise attackers use many tricky techniques to lure you into taking action. We’ll take them up later in this post.

BEC attacks are often well-researched. Cybercriminals target C-suite and finance employees who have the power to authorize payments or have access to financial and data systems. Scams involving business email compromise are frequently successful and lucrative.

What is Business Email Compromise - Red Flags

What the Numbers Say

To understand the gravity of business email compromise (BEC) attacks, let’s look at the numbers. They usually don’t lie. 

Leading cloud email security provider GreatHorn reported the following findings in its 2021 Business Email Compromise Report:

Identity Protection - McAfee Total Protection
Buy Now
We earn a commission if you make a purchase, at no additional cost to you.

Other cybersecurity centers tell a similar story:

#2 So here we are at the middle of the post. We still think it's a good idea to signup.

By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.

What Does BEC Do to your Business?

BEC has serious business ramifications. BEC assaults pose a significant financial danger to enterprises, in addition to the possibility of data theft. Most BEC attacks target suppliers, vendors, and contractors requesting fund transfers. The wire transfers go straight to their fraudulent bank accounts.

In the case of invoices for example, attackers do their assignment well. They know that there are legitimate payments to be made by the company. They then impersonate suppliers requesting fund transfers.

If the sender is familiar, overworked finance employees often don’t check out the little details. A missing letter or character, or a subtle misspelling in the domain name can elude the human eye. A missing letter that your employee fails to check, such as in “joe.doe@compny.com” instead of “joe.doe@company.com”, could hand over your hard earned profits to a criminal. 

Furthermore, if attackers gain access to information about your company’s suppliers, customers, or partners, your company’s reputation and brand value could suffer. As a natural consequence, you could lose current and potential customers. The attackers can also come back for future attacks.

So What is Business Email Compromise?

Business email compromise is a type of cybercrime in which an attacker defrauds an organization by using email. BEC attacks are aimed at businesses of all sizes in every industry around the world. Many organizations have been exposed to billions of dollars in potential losses as a result of BEC schemes.

A BEC attack is a cyber crime that involves the hacking, spoofing, or impersonation of a company’s email address and assuming an authoritative identity. A BEC victim receives an email that appears to come from a reputable company. The email appears to be authentic. However, it usually includes a phishing link, malicious attachment, or secure attachment containing fake invoices.

Account takeover (ATO) is a related threat that’s associated with BEC. ATO happens when hackers gain access and control over online accounts using stolen credentials. ATO is a helpful tool for BEC attacks because cybercriminals can use legitimate addresses to send illegitimate requests for payment and purchase requests.

Common Types of BEC Attacks

The FBI has identified five common types of BEC attacks. Here they are:

CEO fraud

CEO fraud attackers impersonate a company CEO by compromising his email address. Using this identity, they steal money from the organization or steal a victim’s sensitive data. The faked email address will usually be slightly different from the real account — for example, “joe.doe@compny.com” instead of “joe.doe@company.com”.

The attacker poses as a company executive and sends an email to a member of the finance department. He then requests funds to be moved to an account controlled by the attacker.

Data theft

This type of BEC attack usually targets HR employees in order to obtain personal or sensitive information about company executives and CEOs. This information can then be used in future attacks on CEOs.

Email account compromise (EAC)

A hacker gains access to an employee’s email address, which is then used to make payment requests to fake vendors. Payments are subsequently transmitted to the attacker’s fake accounts. 

False invoice scheme

The cyber thief infiltrates the company’s email system using malware, spear phishing attack, or another phishing tactic. The hacker then takes control of an employee’s email address to be used to request invoice payments. The hacker can also use this account in sending money to an account owned by this hacker.

The cyber criminal sends an email to the hacked account instructing the recipient to transfer money to a specified account in payment for the fake invoice. Often, the email has some sense of urgency. Because the targeted employee believes the email sender, he or she sends money to a phony account linked to the cyber criminal.

Lawyer impersonation

A cyber criminal poses as a lawyer representing a client and approaches an executive of the company. The culprit makes it clear that this communication is time-sensitive or highly confidential. The BEC victim provides the requested funds under pressure and in the belief that he or she is doing the right thing.

BEC criminals usually launch their attacks during busy days and hours, such as during the late hours on Fridays or the last day before a holiday.

We might add a sixth type, which is a third party email compromise. Third parties include vendors, suppliers, contractors, partners, and other external stakeholders. 

For example, a BEC attacker may take over a recognized vendor’s legitimate email account. The attacker uses this account to trick a finance executive or employee into wiring funds for payment of an invoice. Of course, the funds will land into the criminal’s fraudulent bank account. 

How Business Email Compromise (BEC) Works

It’s vital to note that BEC schemes rely on social engineering and the human aspect of trust. For this reason, a BEC attack requires a deliberate and strategic approach.

Impersonation tactics such as domain spoofing and look-alike domains are used in BEC frauds. Domain misuse is a common tactic that makes these attacks effective.

It’s difficult enough to stop domain spoofing. It’s even more difficult to anticipate every possible look-alike domain. And the challenge grows with each domain of an external partner that could be used in a BEC assault to take advantage of customers’ confidence.

How BEC it Works

Here are the basic steps attackers do when launching a BEC attack:

1. Identify and research the target victim

The cyber criminal spends time investigating the company that will be targeted. To gather the names and titles of important company workers, the criminal leverages publicly available information such as news announcements, LinkedIn profiles, website content, and social media posts.

The ideal target is someone in a position of power. Because employees are prone to believe and react fast to emails of executives, BEC scams are easier to pull off.

2. Set up the BEC attack

After gathering relevant information, the cyber criminal either uses phishing to breach the company’s email system or spoofs a key executive’s email account.

Once inside the organization, the cyber criminal uses the compromised or spoofed email to intercept communications and monitor transactions. The criminal’s goal now is to watch legitimate behavior without being seen or heard. They may set up a monitoring and forwarding tool to observe the target invisibly. They will also keep an eye on messages from vendors or partners, particularly those involving financial transactions.

3. Launch the BEC attack

With the CEO or executive’s spoofed email account, the cyber criminal then sends targeted and urgent emails to specific employees. The cyber criminal will pose as a CEO, executive, colleague, lawyer, or business partner, asking for money transfers or secret information.

Because the email address is familiar and the request is not unusual, unsuspecting employees don’t hesitate to follow the cyber criminal’s instructions. Typically, employees believe that by paying an outstanding invoice or moving funds to a new firm partner, they are acting in the best interests of the company. Unknowingly, they’re transferring funds to fraudulent accounts.

4. Take the money or steal the data quickly

If the funds transfer or data breach is successful, the criminal takes the money or steals the data immediately and moves on to the next victim. 

Common BEC Attack Techniques

Since BEC focuses primarily on social engineering, it’s simple to carry them out with only a few tools and know-how. BEC is becoming increasingly popular among attackers due to its ease of use and repeatability.

The following are five common forms of BEC attack techniques:

Leverage established relationships

Attackers make a coordinated attempt to leverage an existing trusted relationship to enable them to request urgent responses. They may masquerade as a vendor asking for invoice payments, an executive requesting gift cards, or an employee providing new payroll direct deposit data.

Use socially engineered messages

Subject lines in BEC emails frequently show urgency, familiarity, obligation, or even fear, with the goal of prompting immediate action.

BEC criminals don’t have to launch phishing attack attempts. All they have to do is use tricky but persuasive language to con their victims into giving in to their demands. BEC email content uses deceptive, manipulative language that pulls threads to make specific, seemingly legit requests. 

The following are examples of common terms found in subject lines:

What are BEC attack types

Add seemingly authentic (but suspicious) attachments

Malware is frequently associated with suspicious attachments in email attacks. In BEC scams, attackers do away with malware. Instead, they attach documents that contain false invoices as a basis for their payment requests. These add-ons are lures designed to entice targets even more.

Simulate routine workflows

Every day, employees do a lot of work procedures, many of which are automated and handled by email. The more workflows are repeated, the faster staff can execute tasks without much thought. 

BEC scam attempts mimic these day-to-day workflows in order to fool victims to act before thinking. For example, requests for payments on invoices is a regular part of doing business. Attackers can spoof vendor emails or launch man-in-the-middle attacks to divert the funds to the thieves’ own accounts.

Use free software for legitimacy

Attackers use publicly available software to give BEC scam attacks a sense of legitimacy. Free software also enables them to get emails past security systems that block known malicious URLs and domains.

For example, attackers can set up phishing pages with Google Sites. They can use Google Forms and Docs to harvest personal data from victims. Attackers can also use Box and Google Drive to store zero-day phishing links and bogus invoices.

Why are BEC Attacks Often Successful

To succeed, BEC attacks rely greatly on the human factor

By nature, people will trust email senders they know and with whom they have a long standing relationship. This is why they will often execute an action even if they do not verify account information, the request’s legality or the email sender’s legitimacy.

BEC attackers take time and care building a detailed attack plan that is difficult to detect even by the most alert executives. They study their target’s email habits, including the language they use and the usual time they open their emails. 

BEC criminals patiently research who a CEO will normally email for payment of invoices, gift card requests, or confidential information. 

In short, among others, social engineering attacks make most BEC attempts successful.

Real Examples of BEC Crimes

No organization is immune from BEC attacks, be it government, big enterprise, small business, and even non-profits. And the threat is increasing in sophistication and frequency. Take the case of the following incidents that have cost corporate victims time, reputation, and money in the millions:

Government of Puerto Rico, $2.6 million, 2019-2020

The finance director of the Industrial Development Company of Puerto Rico mistakenly transferred almost $2.6 million to a bogus bank account. He received an email informing him that the bank account for remittance payments had changed. The email was sent from a compromised email account of the Puerto Rico Employment Retirement System. After the discovery, the FBI was able to freeze the funds.

Toyota, $37 million, 2019

In 2019, Toyota Boshoku Corporation, a Japanese auto parts supplier, was the victim of a $37 million BEC fraud. An executive in the company’s financial department was duped and persuaded to execute a wire transfer by hackers. Foreign suppliers are common BEC targets.

Save the Children, $1 million, 2018

In 2018, BEC assaults targeted Save the Children, a non-profit organization. Cybercriminals hacked an employee account at the non-profit and sent out bogus invoices and documents related to a project in Asia.

Ubiquiti Networks, $46 million, 2015

In 2015, Ubiquiti Networks, a network technology business based in the United States, was hit by a BEC attack and lost USD 46 million. The fraudsters pretended to be company employees and targeted the finance department. This demonstrates that even technology corporations are vulnerable to cyber-attacks.

Facebook and Google, $121 million, 2013-2015

The criminals created a fictitious corporation called “Quanta Computer,” which is the same name as a legitimate hardware supplier. The group then provided bogus invoices to Facebook and Google, which were dutifully paid to the criminals’ bank accounts. 

Lesson learned: If two giant tech companies were victims of BEC fraud, it could happen to any business.

How can you defend against BEC

Antivirus, spam filters, and email whitelisting are ineffective against many BEC attempts that rely on social engineering techniques. However, making your employees aware of the warning signs and training them on email best practices is one of the most effective things you can do. 

Here are some self-defense methods your company can use:

1. Refrain from using free web-based email accounts

Generate your own company domain and use it to create an individual company email account for each employee instead of using free web-based accounts.

2. Educate your people

Educating your staff about the scam is one of the most effective strategies to avoid a BEC attack. They must recognize the telltale indicators of a phishing email, such as messages that:

How to protect against BEC attacks

3. Never open emails from unknown senders 

If you do, avoid clicking on links or opening attachments since they may include malware that can infect your computer.

4. For corporate email accounts, enable multi-factor authentication

To log in, you’ll need more than one piece of information, such as a password and a dynamic pin, code, or biometric feature. Multi-factor authentication makes it tougher for a cybercriminal to gain access to an employee’s email, making a BEC attack more difficult.

5. Verify the sender’s email address

The extension of a faked email address is subtly the same as the authentic email address. For example, an email recipient may mistake the fake “joe.doe@compny.com” for the authentic  “joe.doe@company.com”.

You should also check the email headers. An email message’s headers may contain information that can assist you in determining if it is valid or not. For example, the email could have a different Internet Protocol (IP) address than the one your organization usually uses.

6. Always double-check before sending money or sensitive information

Employees should be required to validate email requests for a wire transfer or secret information as routine operating procedure. Confirm in person or use the company’s phone number rather than the phone numbers provided in the email.    

7. Protect your brand by implementing email security measures

Setting up email security measures, such as encryption, is another security strategy you may use. Other helpful techniques include:

8. Install malware protection on all devices

Malware protection should be installed on your business’s devices to guard against malware and phishing attacks. Antivirus, anti-spyware, and other sorts of security software can be used.

Our final thoughts. You can lower your risk of being a victim by learning how BEC scams work and taking the necessary precautions to protect yourself. We hope you’ll find the measures we’ve highlighted to keep your firm safe against corporate email compromise scams.

#3 You really should sign up. "Scouts Promise" ... it really will help you stay cyber safe.

By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.