What Is Business Email Compromise?
FBI IC3 reported losses: $2.77 billion in 2024 alone — more than any other cybercrime category
Scope: 73% of all reported cyber incidents involve BEC or phishing
AI acceleration: 1,760% year-over-year increase in BEC attacks since generative AI adoption
Average cost per breach: $4.89 million (IBM Cost of a Data Breach Report)
Targeting: 70% of organizations experienced at least one BEC attack in the past year
It Looked Like a Normal Invoice
In August 2024, an employee at Orion S.A., a Luxembourg-based carbon black manufacturer, received an email that appeared to come from a senior executive. The email instructed the employee to process a wire transfer to a specific bank account for a pending business transaction.
The email looked legitimate. The language was professional. The request was plausible. There was no malware attached. No suspicious links. No misspelled words or broken formatting.
The employee processed the wire. Then another. Then another.
By the time anyone realized what had happened, $60 million had been wired to attacker-controlled bank accounts. Orion disclosed the loss in an SEC filing, noting that the fraud “involved multiple fraudulently induced outbound wire transfers to accounts controlled by unknown third parties.”
This is how business email compromise works. There’s no malware to detect. No firewall to trigger. No antivirus signature to match. BEC is pure social engineering — an attacker impersonating someone the victim trusts, asking them to do something that seems perfectly routine.
And it bypasses every technical security control you have.
Nobody Is Too Smart for This
If you’re thinking “our team would never fall for that,” consider the companies that did.
Google and Facebook — two of the most sophisticated technology companies on Earth — lost a combined $100 million to a single Lithuanian man named Evaldas Rimasauskas. Between 2013 and 2015, he sent fake invoices impersonating Quanta Computer, a real hardware vendor both companies used. The invoices were accompanied by forged contracts, letters, and bank account details. Finance teams at both companies paid them without question.
Toyota Boshoku, a subsidiary of Toyota, lost $37 million when attackers impersonated a business partner and convinced a finance executive to change wire transfer details for an upcoming payment. The attackers had done enough research to know the exact details of the business relationship, the timing of expected payments, and the communication style of the partner.
These aren’t careless companies staffed by inattentive employees. These are global enterprises with security budgets in the hundreds of millions. BEC works because it exploits trust, authority, and urgency — not technical vulnerabilities.
The Five Types of BEC Attacks
BEC isn’t a single tactic. It’s a category of attacks that all rely on impersonation and social engineering. The FBI identifies five primary variants:
1. CEO Fraud (Executive Impersonation)
The attacker poses as a C-suite executive — typically the CEO or CFO — and emails a finance employee with an urgent wire transfer request. The email creates pressure by referencing a confidential deal, an acquisition, or a time-sensitive payment. Employees are reluctant to question executives, especially when the request is marked “urgent” and “confidential.”
2. Invoice Fraud (Vendor Impersonation)
The attacker impersonates a legitimate vendor or supplier and sends an invoice with “updated” bank account details. Because the company already expects invoices from this vendor, the payment is processed without additional verification. This is how Google and Facebook lost $100 million.
3. Account Compromise (Email Takeover)
The attacker gains access to a real employee’s email account — through phishing, credential stuffing, or infostealers — and uses it to send fraudulent payment requests to vendors, clients, or other employees. Because the email comes from a legitimate account, it passes every authentication check.
4. Attorney Impersonation
The attacker poses as a lawyer or legal representative handling a confidential matter. They contact a finance employee and pressure them into wiring funds for an “escrow payment,” “settlement,” or “retainer.” The confidential nature of legal matters discourages the employee from verifying with others.
5. Data Theft (HR/Payroll Targeting)
Instead of requesting money, the attacker targets HR or payroll departments to steal employee W-2 forms, direct deposit details, or personally identifiable information. This data is used for tax fraud, identity theft, or sold on the dark web.
AI Made It Worse — Much Worse
BEC attacks have existed for over a decade. But generative AI has supercharged them in ways that fundamentally change the threat landscape.
40% of BEC phishing emails are now AI-generated, according to recent threat intelligence reports. And the quality is dramatically better than anything human attackers produced previously.
Before AI, BEC emails often contained telltale signs: awkward phrasing, unusual formatting, generic greetings, or grammatical errors that didn’t match how the impersonated executive actually wrote. Security awareness training taught employees to look for these red flags.
AI-generated BEC emails have none of these flaws. They feature:
- Perfect grammar and syntax in any language
- Writing style mimicry — AI can analyze an executive’s previous emails (obtained from breaches or reconnaissance) and replicate their tone, vocabulary, and sentence patterns
- Contextual awareness — references to real projects, real colleagues, real deadlines, and real business relationships
- Personalization at scale — each email is unique and tailored to the specific recipient, making template-based detection useless
The threat has also evolved beyond email. Attackers now use dual-channel attacks — combining email with follow-up phone calls, text messages, or voicemail using AI-generated deepfake audio of the impersonated executive. An employee who might hesitate at an email alone will comply when a “phone call from the CEO” confirms the request.
Vendor Email Compromise (VEC) — a variant where attackers compromise a vendor’s email system and use it to send fraudulent invoices to the vendor’s customers — has increased 66%. Because the emails come from the vendor’s real email domain, they pass SPF, DKIM, and DMARC authentication. They arrive in the inbox looking identical to every other email from that vendor.
Why Your Industry Is a Prime Target
BEC attackers don’t choose targets randomly. They research industries where high-value wire transfers are routine, where urgency is a normal part of business, and where verification processes are likely to be informal.
CPAs & Accounting Firms
Why you’re targeted: You process high-dollar wire transfers and tax payments daily. During tax season, urgency is constant and volume is overwhelming. You hold Social Security numbers, bank account details, and financial records for hundreds of clients.
Common attack: An email from a “client” asking you to wire their tax payment to an updated bank account. Or an “IRS notification” requesting immediate action on a pending audit.
The risk: A single compromised wire can expose your firm to malpractice liability and destroy client relationships built over decades.
Law Firms
Why you’re targeted: You manage trust accounts, real estate closings, and settlement disbursements. Wire transfers of hundreds of thousands of dollars are routine. Attorney-client privilege discourages employees from seeking verification outside the chain of command.
Common attack: An email impersonating a partner directing an associate to wire closing funds to “updated” escrow account details. Or a fake email from opposing counsel redirecting a settlement payment.
The risk: Loss of client trust funds triggers bar association complaints, malpractice claims, and potential loss of your license to practice.
Healthcare Organizations
Why you’re targeted: You process insurance payments, vendor invoices for medical equipment and supplies, and patient billing. Many healthcare organizations operate with lean IT staff and limited cybersecurity resources.
Common attack: An email impersonating a medical supply vendor with “updated” payment instructions. Or a fake email from an insurance company requesting patient records for “claims processing.”
The risk: Financial losses compound with HIPAA violations if patient data is exposed. Average healthcare breach cost: $10.93 million.
Small & Mid-Size Businesses
Why you’re targeted: You have fewer verification controls, smaller finance teams (often one person), and less formal approval processes for wire transfers. Attackers know that a single successful BEC against an SMB can be financially devastating.
Common attack: An email from the “CEO” to the bookkeeper requesting an urgent wire transfer for a new vendor payment or an acquisition deposit.
The risk: The average BEC loss can represent months of operating capital. For many SMBs, a single successful BEC attack is an existential financial event.
What You Should Do Right Now
1. Verify Payment Changes by Phone
Any request to change bank account details, wire transfer instructions, or payment methods must be verified by phone — using a known phone number, not the one provided in the email. This single control would have prevented every case study in this article.
2. Implement Dual-Authorization for Wire Transfers
No single employee should be able to authorize a wire transfer above a defined threshold. Require two-person approval for any wire transfer over $10,000, and enforce a mandatory delay between request and execution for transfers over $50,000.
3. Enable MFA on All Email Accounts
Account compromise is the most dangerous form of BEC because it comes from a real email address. Multi-factor authentication prevents attackers from accessing accounts even if they steal the password. Prioritize phishing-resistant MFA (hardware keys or passkeys) over SMS-based codes.
4. Train Employees on BEC Red Flags
Regular training should cover the five BEC attack types, with emphasis on urgency-based social engineering. Employees need to understand that any email requesting a payment or a change to payment instructions is potentially fraudulent, regardless of who it appears to come from.
5. Monitor Email for Suspicious Activity
Compromised accounts often set up email forwarding rules to intercept replies, create inbox rules to delete sent messages, or add delegate access. Regular auditing of email rules and configurations can detect account compromise before the attacker sends fraudulent payment requests.
6. Deploy Behavioral Detection / MDR
BEC doesn’t generate the same signals as malware. It requires monitoring for behavioral indicators: unusual login locations, impossible travel, new email forwarding rules, mass email downloads, and credential access patterns that deviate from the user’s baseline.
Why MDR Catches What Email Filters Miss
Email Security Alone
- Blocks known malicious domains and attachments
- Cannot detect emails from compromised legitimate accounts
- AI-generated emails bypass content analysis
- No visibility into post-delivery account behavior
- Helpless against vendor email compromise (real domain, real account)
MDR with Behavioral Detection
- Detects suspicious email forwarding rules and delegate access
- Identifies credential theft and account compromise in real time
- Flags unusual login patterns and impossible travel
- Monitors for mass email downloads and data exfiltration
- 24/7 monitoring catches account takeover before the wire goes out
Email security filters are designed to block malicious content — malware attachments, known phishing URLs, and spoofed domains. BEC attacks don’t use any of these. They use clean text from legitimate or lookalike accounts.
MDR doesn’t just watch your email gateway. It monitors the entire identity and access layer — every login, every email rule change, every access pattern across your environment. When an attacker compromises an account and sets up forwarding rules to intercept replies, MDR catches it. When credentials are used from an impossible geographic location, MDR catches it. When an account that normally accesses email suddenly starts downloading the entire mailbox, MDR catches it.
The Orion S.A. $60 million loss, the Toyota $37 million loss, the Google/Facebook $100 million loss — in every case, the fraud required the attacker to communicate through email accounts and the victim to process wire transfers. Behavioral monitoring at the account level would have flagged the anomalies before the money moved.
The Bottom Line
BEC doesn’t trigger antivirus. It doesn’t trip your firewall. It doesn’t match a threat signature. It arrives as a normal-looking email from someone you trust, asking you to do something you do every day. The only defense is monitoring for the behavioral signals of account compromise — suspicious login patterns, new email forwarding rules, credential theft, and unusual access behavior — before the attacker sends the email that costs you everything.
Stop the wire before it’s too late.
Our MDR service provides 24/7 monitoring for account compromise, suspicious email rules, and credential theft — catching the behavioral signals of BEC before the fraudulent wire transfer is ever sent.
Book a Free Consultation