How BEC attacks work
In a typical Business Email Compromise attack, criminals either spoof or compromise a legitimate business email account. They monitor conversations and wait for payment opportunities, then send modified wiring instructions.
Common BEC scenarios
- Executive impersonation (CEO fraud)
- Vendor invoice modification
- Payroll diversion
- Attorney impersonation scams
Prevention strategies
- Multi-factor authentication (MFA) on email accounts
- Mandatory verbal verification for payment changes
- Dual authorization for wire transfers