Business Email Compromise
Also known as: BEC, CEO fraud, invoice fraud
A targeted fraud in which an attacker impersonates an executive or trusted vendor over email, convincing an employee to wire money, change bank details, or share sensitive data.
Last updated:
What is BEC?
Business email compromise (BEC) is a targeted fraud that uses email impersonation to trick a company employee into authorizing a fraudulent wire transfer, rerouting an invoice payment, or handing over sensitive information. Unlike bulk phishing, BEC is low-volume and high-value — each campaign is tailored to a specific company, with attacker reconnaissance on org charts, vendor lists, and pending payments. The FBI's Internet Crime Complaint Center has reported BEC as the single most costly category of cybercrime for years running, with over $50 billion in reported losses between 2013 and 2024.
Common BEC patterns
- CEO fraud — a spoofed executive email instructs a finance employee to send a wire "urgently and confidentially," usually timed to when the real executive is traveling
- Invoice fraud — the attacker compromises a real vendor inbox, finds a pending invoice, and sends the customer updated "bank details" that route to the attacker's mule account
- Payroll diversion — the attacker impersonates an employee and asks HR to reroute their direct-deposit to a new bank account
- W-2 / data theft — an impersonated executive asks HR or finance for employee tax records
How BEC evades detection
BEC rarely contains malicious attachments or links, so legacy email security (sandboxing, URL rewriting) does not flag it. Detection relies on sender-authentication checks (SPF/DKIM/DMARC), anomaly detection on wire-transfer requests, mandatory out-of-band verification for new bank details, and IP reputation on the sending server — compromised-inbox and lookalike-domain senders frequently originate from hosting ASNs with abuse history.
Check the IP behind a suspicious email before you wire money with our IP abuse report checker.