Business Email Compromise (BEC): Protecting yourself and your business from online scams

Are you and your company vulnerable to business email compromise (BEC) attacks?

Business Email Compromise is a scam or attack from online criminals in an attempt to defraud a company for thousands, sometimes even millions, of dollars by targeting their email systems.

Consider these 4 facts about BEC that might surprise you:

  • The FBI’s Internet Crimes Complaint Center reported U.S. businesses were subject to over $2 Billion in losses from BEC crimes between 2014 and 2019
  • Those numbers have skyrocketed since then, reaching a staggering $1.8 billion in losses in 2020, then $2.4 billion in 2021. During this time, there was a nearly 65% increase in the number of complaints filed
  • Not all scams are reported, and the number of attacks and attempts at BEC scams are likely much greater
  • With the massive increase in virtual business, meetings, communication and financial transactions, BEC attackers continue to find new ways to exploit and infiltrate businesses

Types of BEC Attacks

BEC attacks can appear in many forms. They almost always target an individual in an attempt to collect important or confidential internal data. It might also involve posing as an executive or client to trick an employee into invoicing or wiring money directly to the scammer.

Are you prepared to defend against BEC? Let’s take a look at the most common forms of Business Email Compromise: Malware and email phishing.

Malware Attacks

Malware is the oldest trick in the email compromise book. Malware has been used by cybercriminals for decades with a long list of motivations, including data breaches, remote system control, wire transfers, and even ransom.  

Malware, also known as malicious software, is a piece of software designed to gain access to or damage a computer or network’s systems. In the case of BEC, it may appear as an email attachment or a link that takes you to an automatic download intended to cause harm.

Example: A scammer sends an email that says “Hi Riley, I manually updated the data tables for Q3 and attached the file below,” with a fake spreadsheet file attached to the email for the victim to download. This download gives the scammer access to the business network, threatening the security of the organization. 

How to prevent malware attacks at your business:

  • Avoid clicking on suspicious links or unknown file types and train your team to take these same precautions
  • Use anti-malware or malware detection software on all computers within your network
  • Secure your accounts with strong passwords and multi-factor authentication (2FA)

Spoofing and/or Phishing Emails

Another common method of BEC attacks is spoofing/phishing emails. Chances are, you’ve received at least one phishing email in your lifetime, if not many more. 

Spoofing attacks are when the sender impersonates a trusted sender in an attempt to infiltrate accounts, internal systems, or gain access to confidential data (and sometimes even Amazon gift cards). These types of BEC attacks are often a series of emails attempting to gain trust and become more familiar before attempting to initiate the BEC scam.

Example: You receive an email that appears to be from someone who works in your finance department, asking you to change the payment information on an invoice and send payment out ASAP. These will typically appear to be a real email from an authentic sender.

The first step to avoiding phishing emails is learning how to identify some of the following common “red flags”:

  • Misspellings, odd capitalizations, and strange grammar choices
  • Asking for sensitive information with very little context
  • Hurrying or pressuring language
  • Discrepancies in the email address or the sender’s name
  • Low-resolution company logos and non-standard email signatures

How to identify spoofing and/or phishing attempts:

Constant vigilance! It never hurts to have a healthy amount of suspicion. If any of these boxes are checked, especially if you’re receiving the request seemingly out of the blue or aren’t sure why you’re being asked, take the following precautions:

  • “Mouse over” the sender’s name to reveal the full email address. It might be an email address/domain that you don’t recognize or is slightly misspelled (Bradly-Robinson@email.com instead of Bradley.Robinsion@yourcompany.com)
  • If you believe someone is being impersonated, reach out to the supposed sender through other channels like Slack, text, or even an in-person meeting. Avoid using contact information from the suspected fake email
  • Contact a co-worker in the same department or who works closely with the person to verify
  • Request additional information or some form of verification from the sender

FAQs: (Almost) Everything Else You Should Know About BEC

Question: Who is most vulnerable to Business Email Compromise scams?

All businesses are at risk of being targeted by BEC scams, but most commonly individuals that work on executive teams and in financial departments. Scammers may also target:

  • Small businesses using electronic transactions or wire transfer
  • Large Enterprises where all employees might not know each other
  • Mid-sized businesses that commonly work with vendors/contractors and frequently write invoices

Question: What are common defenses and ways to identify potential BEC scams? 

If you believe you are being targeted by a BEC scammer you can try some of the following steps to check their legitimacy:

  • Verify the Email address/sender
  • Verify files/downloads before clicking
  • Examine URLs/links closely 
  • Be aware of strange or pressuring language
  • Verify purchase requests or invoices in person/through other channels

Question: What are some other ways I can prevent BEC scammers from attempting to contact me and protect myself if they do?

Some other tips to passively protect yourself and your email from BEC attempts are:

  • Utilize DNS security that can block phishing links
  • Use multi-factor authentication (or 2FA) for your email
  • Third-party malware detection software or browser extensions
  • Keep updated, strong passwords 
  • Keep updated address books/directories for vendors and contacts
  • Avoid sharing personal information publicly that could be used as security questions or password resets

BEC scams have been reported in all 50 U.S. states and 177 countries worldwide. As companies continue to transition to virtual meetings and online transactions, the frequency of Business Email Compromises increases as well—that means you should be taking extra precautions to protect your business.

DNSFilter protects thousands of companies across the world from BEC. See how it works with a 14 day free trial.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Revving up the Fun: DNSFilter's IndyCar Experience Recap — Long Beach Edition Revving up the Fun: DNSFilter's IndyCar Experience Recap — Long Beach Edition

What a weekend at the Long Beach street circuit! The energy was electric, the excitement palpable, and DNSFilter was at the heart of the action, ensuring our guests had an unforgettable experience with Juncos Hollinger Racing and Romain Grosjean, the #77 driver for Juncos Hollinger.

Securing Public Wireless Networks Securing Public Wireless Networks

In the current era of digital transformation, securing public wireless networks has emerged as a fundamental challenge for IT professionals worldwide. The evolution of technology and the increasing reliance on digital platforms for both business and personal use have made public Wi-Fi networks indispensable. However, greater access creates greater vulnerabilities, making these networks prime targets for cybercriminals. The imperative to secure pu...

How to Secure Public Wi-Fi Networks How to Secure Public Wi-Fi Networks

In the quest to safeguard public Wi-Fi networks from the myriad of cyber threats, certain proactive steps stand out as fundamental. These measures form the backbone of a comprehensive security strategy, ensuring that the network remains robust against unauthorized access, data breaches, and various forms of cyberattacks.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.