Webinars
Defending Data Brokers
May 13, 2026 | 12:00 PM – 1:00 PM ET
Zoom
Business email compromise (BEC) threats are soaring. Huge amounts of money are at risk. We share some practical tips to reduce the chances of being swindled — and to try to recover amounts if you are.
In BEC and related scams, the threat actors trick unsuspecting targets into sending money to the perpetrators, often either by fraudulent wire or ACH transfer instructions.1 These scams, which target organizations from multinational corporations to small churches, rely heavily on the art of deception to defraud targets or to dupe them into desired action.
The Schemes
Generally, BECs involve communications with the target organization that are designed to appear legitimate. Threat actors have developed certain variants of BEC scams.2 This article focuses on those schemes that look to trick people into sending funds to a fraudster by posing as a reliable figure (such as a manager, a vendor, a customer, or a client) to request payment for a real or seemingly real transaction.
We described the mechanics and pitfalls of some of these schemes in our last article. These threat actors rely on the recipient’s faith in known relationships, desire to help, and interest in taking on new business or keeping commercial deals going. The scams might involve emails from addresses that appear legitimate but in fact are slightly different, contain enough real information to seem trustworthy, or urge immediate action for seemingly valid reasons. No matter the method, BECs mean big bucks. The Federal Bureau of Investigation’s Internet Crime Complaint Center (“IC3”) tracks and analyzes BEC complaints and reports. They have reported that, between June 2016 and July 2019, global victims suffered losses of more than $26.2 billion, with the U.S. making up over $10 billion of that total.3
The Protections
Technical Measures
Your technical environment defends you against a number of BEC attempts. The FBI4 and others encourage you to:
Policies to Consider
You can bolster your technical defenses by anticipating the possibility of BECs. You stress the importance of being prepared to your management, employees, and business partners by proactively establishing practices. These policies should be revisited for updates as needed. You can consider the following:
Your Bank
Your Customers/Clients/Vendors
Your Payment Processes
Your Employees
Response Plan
Be ready to act quickly if you find you have been tricked into sending funds to a threat actor’s account. Your chances to recover any funds are more likely if you discover the fraud very soon after it is perpetrated. Once discovered, even if some time has lapsed after the scheme occurred, you are better off if you deploy a response plan immediately.
Conclusion
You need both a strong offense and a quick defense against the insidious threat of BECs. Awareness of the problem is key and action to combat it imperative. We encourage you to consider the types of steps discussed in this article along with others you may employ or may assess for your particular circumstances.
—–
1 Wire transfer and ACH fraud are just two ways in which threat actors try to profit from BECs. Others include, for example, diverting direct deposit of payroll by seemingly changing account information or encouraging recipients to buy gift cards and then share the card codes with the threat actor. Notably, bad actors may also use BECs to try to gain access to an organization’s systems or data for financial purposes other than redirecting a specific payment.
2 We note that successful scams may attempt business email compromise, but may successfully hijack funds whether or not the victim’s email system is actually compromised. In fact, system compromise may not be the threat actor’s goal, as the threat actor may hunt only for information to use as part of a larger scheme or to request certain actions by the recipient. While this article discusses all of this generally within the context of BECs, the distinction is important as the risks and solutions will differ for technological infiltrations and for social engineering efforts.
3 https://www.ic3.gov/Media/Y2019/PSA190910 (last accessed February 21, 2021).
4 https://www.ic3.gov/Media/News/2020/201204.pdf (last accessed February 21, 2021).
Webinars
Defending Data Brokers
May 13, 2026 | 12:00 PM – 1:00 PM ET
Zoom
Sponsored Events
Venture Idol 2026
May 7, 2026 | 5:00 PM – 8:00 PM ET
Ben Franklin TechVentures
116 Research Drive, Bethlehem, PA 18015
Sponsored Events
New Hampshire Government Finance Officers Association Annual Conference
May 7 – 8, 2026
Grappone Conference Center
Concord, NH
Speaking Engagements
Mortgage Bankers Association Legal Issues and Regulatory Compliance Conference
May 4 – 7, 2026
Intercontinental Hotel
100 Chopin Plaza, Miami, FL 33131