What Is Business Email Compromise?

Painting and calligraphy as an analogy with general phishing and email compromise


You could compare usual email phishing to painting with a broad brush: “You’ve inherited a million dollars” or “Your account has been compromised, ACT NOW!”

In contrast, Business Email Compromise [BEC] is like skillful calligraphy. BEC is craftier because it pays attention to your organization’s practices and waits for the right opportunity. It can be degrees harder to spot BEC attackers’ impersonations.

What is Business Email Compromise?

Not scattershot, laser

Business Email Compromise (BEC) is a sophisticated type of cyberattack that targets organizations by impersonating a trusted party through email. These attacks are designed to trick employees, executives or financial departments into transferring funds or sensitive information to con-artists. Unlike typical phishing schemes, BEC often relies on careful social engineering, where attackers research their targets thoroughly to make their emails appear legitimate and trustworthy. Successful attacks can be devastating.

Not obvious, subtle

There is no one-size-fits-all description of BEC. But as a rule attackers make their approach with studied emails that imitate a known contact like a CEO, vendor or client. Sometimes attackers use a compromised email account on your organization’s server or they use domains that look nearly identical to legitimate ones. The requests are often urgent, instructing the recipient to process payments quickly or send confidential information with an appeal that emotionally stresses the recipient. These malicious emails are meant to blend undetected into an organization’s day-to-day operations.

Not laughable, knowledgeable

Typical phishing attempts can seem too glaring to be real, like Nigerian prince scams. While we can’t know the minds of individual scammers, it’s thought that using outlandish claims or bad spelling and grammar might be a way for them to quickly weed out sophisticated targets.

But whatever their reasoning, BEC attackers are trying for a big payday and so invest the time in learning about an organization and then operate undetected until it’s too late.

Here are some examples:

  • a sudden change in a client’s payment instructions
  • an email from an executive requesting personal account details
  • a requested wire transfer to an unfamiliar destination

These should all be red-flag kinds of messages. Unfortunately they are not usually blatantly obvious because the scammers often hide the requests in emotional baggage. But as a start organizations can protect themselves by training employees to recognize the patterns of BEC attacks and implement a verification process for any financial or sensitive information requests.

Real-world attacks

Barracuda (a Bryley email-protection partner) cites some recent examples, in one famous case, deepfake audio was used to trick a British CEO into believing his German boss had requested a €220,000 money transfer. In another, a bank manager from the UAE was conned into transferring $35 million at the request of a ‘customer’ … One recently spotted attempt tried to trick a victim organization into transferring $36 million in funds.1

And the FBI offers this development in BEC:

  • An organization gets an email that seems to come from a legitimate company with a legitimate-looking request for goods.
  • The sender’s email domain has been spoofed, and the sender’s name may be actual buyers’ names at the company.
  • The criminals provide false credit references and tax forms in order to secure 30- or 60-day credit terms.
  • Once the criminals have received the goods, they disappear leaving the supplier to bill a company that never knew about this request for goods.
  • The victim only realizes they’ve been defrauded days later.

The important thing to remember is not that BEC follows any of these scripts, but that it is an attacker operating discretely, gaining trust and when the attacker feels the time is right, making the fraudulent request.

Defending Against Business Email Compromise $250 savings

In appreciation for reading about Business Email Compromise, submit the form, below, or contact Roy Pacitto with code 69427 by December 31, 2024, Bryley will take $250 off a set-up charge associated with a Bryley service that helps in defending your organization from Business Email Compromise. Conditions apply, see sidebar at right.

  • This field is for validation purposes and should be left unchanged.

Subscribe to Up Times by Bryley, the monthly tech newsletter for New Englanders by New Englanders.

Eligibility for the $250 off a single BEC defense, as listed below, as part of your new Managed IT agreement (Comprehensive Support Program [CSP]):

  • This is a promotion for readers of our Business Email Compromise (BEC) email series who are ready to take the next step.
  • To be eligible, respond via the web form, below, or by phone (978•562•6077 x217) or email with code 69427 by December 31, 2024.
  • This is a special promotion for first-time Bryley clients and applies to the set-up charge of a single service related to protecting an organization from BEC. Qualifying services include:
    • Multi-Factor Authentication
    • Advanced Email Threat Protection
    • XDR
    • Security Awareness Training
    • Phishing Campaigns
    • Dark Web Monitoring
    • M365 or Google Workspace Support
    • M365 or Google Workspace Backup

Bryley CSP Basic and Pro for Network Infrastructure

Features Comparison Chart

Per-device features

Basic

Pro*

Response to network-critical issues

Within four hours.
Same Day, as the situation requires

Within four hours.
Same Day, as the situation requires

Response to non-critical issues

Within eight hours.
Same Day, as the situation requires

Within eight hours.
Same Day, as the situation requires

Performance optimization

Included

Included

Security optimization

Included

Included

Monitoring and alerts

Included

Included

File and patch updates

Included

Included

Reporting

Included

Included

Administration

Included

Included

Reliability optimization

Partial

Included

Software issues

Partial

Included

Hardware issues

Partial

Included

Network issues

Partial

Included

PC imaging

Included

On-site response

Included

Up Times Masthead

  • Subscribe to Up Times, the New England-centric technology newsletter.
  • Up Times covers:
    • Stay informed about industry trends
    • Security tips you can implement now and share with your employees
    • Updates on regional and national laws and compliancies
    • IT-related developments
    • Networking and cybersecurity challenges New England business managers are facing and how they're addressing them
  • In continuous publication since 2000, Up Times arrives monthly in your email box.

You have successfully subscribed to the Up Times by Bryley newsletter

There was an error while trying to send your request. Please try again.

Bryley Systems Inc. will use the information you provide on this form to be in touch with you and to provide updates and marketing.