📧
Business Email Compromise (BEC)
Sophisticated attacks where criminals impersonate executives or vendors to trick businesses into wire transferring funds.
$2.9B (FBI IC3 2023)
Annual losses (US)
21,000+ businesses annually
Reported victims/year
Report Now
FTC: ReportFraud.ftc.gov
🎭 How Scammers Do It: Tactics
- ▸ Compromise or spoof executive email accounts (CEO fraud)
- ▸ Impersonate vendors to redirect legitimate invoice payments
- ▸ Request emergency wire transfers from finance staff
- ▸ Use language and context obtained through reconnaissance
- ▸ Time attacks during executive travel or out-of-office periods
- ▸ Convince HR to redirect payroll direct deposits
🚩 Red Flags: Stop If You See These
⚠ Urgent wire transfer request from an executive or vendor
⚠ Email domain has subtle changes (ceo@company-name.com vs company.com)
⚠ Request to keep the transfer confidential from other staff
⚠ Change in vendor bank account details via email
⚠ Uncharacteristic payment amounts or urgency from known senders
⚠ Request comes when recipient is under deadline pressure
🛡️ How to Protect Yourself
1. Verify all wire transfers with a second factor (phone call to known number)
2. Implement multi-person approval for wire transfers above threshold
3. Enable DMARC, DKIM, and SPF on your company email domain
4. Verify any change in vendor banking details with a phone call
5. Train all finance staff on BEC recognition
6. Use out-of-band verification for all significant financial requests
📋 How to Report This Scam
Report immediately to FBI IC3 at ic3.gov. Contact your bank immediately to attempt wire recall.