$2.9 billion
FBI IC3 reported BEC losses in 2023
Over 65%
Increase in BEC losses from 2019 to 2023
$125,000+
Average loss per successful BEC wire transfer incident
Over 99%
Percentage of BEC attacks involving no malware or malicious links

Business Email Compromise bypasses nearly every technical security control because it is fundamentally a social engineering attack delivered through email. There is no malware for antivirus to detect, no malicious URL for Safe Links to block, and no payload for EDR to flag. The attacker either sends email from a spoofed or lookalike domain, compromises a legitimate email account and sends from it, or manipulates an employee into believing they are communicating with a trusted party. The attack works because it exploits organizational processes that rely on email as an authoritative communication channel for financial transactions.

The FBI's Internet Crime Complaint Center (IC3) consistently ranks BEC as the highest-dollar cybercrime category by far, with 2023 losses of $2.9 billion dwarfing ransomware losses by a factor of 10 in reported dollar terms. The gap is largely attributable to recovery: ransomware losses are often unrecoverable once data is encrypted, but successful BEC wire transfers can sometimes be recovered through rapid FBI notification. Defense against BEC requires a layered approach: email authentication to block spoofing, process controls to add verification steps to financial transactions, employee training on recognizing and verifying unusual requests, and detection capabilities for account compromise and inbox rule manipulation.

BEC Attack Types: CEO Fraud, Vendor Impersonation, and Payroll Diversion

BEC attacks take several distinct forms, each targeting different organizational processes and employee roles. Understanding the attack variant determines which defensive controls are most relevant.

CEO Fraud (Executive Impersonation): The attacker spoofs or impersonates a senior executive (CEO, CFO, or other C-level officer) and sends an urgent request to an employee with financial authority, typically asking for a wire transfer to a new account, a gift card purchase, or a change to vendor payment details. The urgency framing ("I'm in a meeting, handle this immediately without going through normal channels") is designed to bypass verification instincts. CEO fraud typically targets accounts payable staff, executive assistants, or finance department employees.

Defense focus: DMARC enforcement prevents domain spoofing. Process controls requiring phone verification for any executive-initiated financial request provide the critical out-of-band verification step. Train employees that any executive email requesting financial transactions outside normal channels should be verified by calling the executive at a known number, not replying to the email.

Vendor Impersonation (Invoice and Payment Redirection): The attacker impersonates a known vendor or supplier and requests that the organization update payment details to a new bank account. The request appears to come from a legitimate vendor relationship, often referencing real invoice numbers or project names obtained through OSINT or a prior compromise of the vendor's email system. Finance teams process the updated payment details and subsequent legitimate invoices are paid to the attacker's account.

This variant is particularly effective because it exploits an existing trusted business relationship and the request (updating payment details) is a normal business activity. Defense focus: establish a callback verification policy requiring that any payment detail change for an existing vendor be confirmed via phone at the vendor's known contact number (not the number provided in the change request email).

Payroll Diversion: The attacker, often using a compromised or spoofed employee account, contacts HR or payroll with a request to update direct deposit banking information. When the next payroll runs, the employee's salary is diverted to the attacker's account. The employee may not realize for 2 to 4 weeks until they notice missing deposits.

Defense focus: out-of-band verification for any direct deposit change request. A phone call to the employee at their known number, or an in-person verification for local employees, eliminates this attack vector entirely.

M&A and Real Estate Fraud: Attackers monitor for public announcements of mergers, acquisitions, or real estate transactions and insert themselves into the communication flow at the point where wire transfers are expected. The attacker sends wire instructions that appear to come from the other party or from the escrow or title company. Losses in this category are often in the millions.

Account Compromise-Based BEC: Rather than spoofing or impersonating, some BEC attacks begin with compromising a legitimate email account (via phishing or credential stuffing) and then operating from that account to conduct fraud. This variant bypasses DMARC and email authentication entirely because the email comes from the legitimate account. Detection requires monitoring for inbox rule creation, unusual forwarding rules, and authentication anomalies.

Email Authentication: DMARC, DKIM, and SPF as BEC Prevention

Email authentication prevents attackers from spoofing your domain in emails sent to your own employees and customers. Implementing DMARC at p=reject is the single highest-impact technical BEC prevention control.

SPF (Sender Policy Framework): SPF is a DNS TXT record that lists the IP addresses authorized to send email on behalf of your domain. When a receiving mail server gets an email claiming to be from your domain, it checks whether the sending IP is in your SPF record. If not, the email fails SPF.

Publish your SPF record:

yourdomain.com. IN TXT "v=spf1 include:spf.protection.outlook.com include:_spf.google.com ~all"

The ~all (soft fail) is a starting point for testing; harden to -all (hard fail) after validating all legitimate mail sources are included.

DKIM (DomainKeys Identified Mail): DKIM adds a cryptographic signature to outgoing email that proves the email was sent by a server with authorization from the domain owner and that the message was not modified in transit. Receiving mail servers verify the signature using a public key published in DNS.

For Microsoft 365, enable DKIM signing per domain in the Defender portal or via PowerShell:

New-DkimSigningConfig -DomainName yourdomain.com -Enabled $true

Publish the CNAME records returned by this command in your DNS before enabling.

DMARC (Domain-based Message Authentication, Reporting, and Conformance): DMARC ties SPF and DKIM together and specifies what to do with email that fails authentication. The policy options are:

  • p=none (monitor mode): collect reports, take no action on failures
  • p=quarantine: send failing email to spam folder
  • p=reject: reject failing email outright

DMARC at p=reject is the only policy that fully prevents your domain from being used in phishing attacks against your employees. It also prevents attackers from spoofing your domain in attacks against your customers.

DMARC deployment sequence:

  1. Publish p=none with rua (aggregate reporting) and ruf (forensic reporting) addresses
  2. Review reports for 2 to 4 weeks to identify all legitimate mail senders that need SPF/DKIM alignment
  3. Move to p=quarantine; pct=25 (apply to 25 percent of failing mail)
  4. Increase pct to 100 percent after confirming no legitimate mail is quarantined
  5. Move to p=reject once stable at p=quarantine; pct=100

DMARC aggregate reports can be parsed using MXToolbox, Valimail, or Dmarcian to identify unauthorized mail sources.

Lookalike domain protection: DMARC prevents spoofing of your exact domain but does not prevent lookalike domain attacks (micros0ft.com, yourcompany-invoices.com). Defense against lookalike domains requires registering common misspellings and variants, monitoring for newly registered domains similar to yours (using tools like dnstwist), and configuring your email gateway to flag or block email from domains registered within the past 30 days.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Microsoft 365 Anti-BEC Configuration

Microsoft Defender for Office 365 provides specific anti-impersonation capabilities designed to detect BEC attempts at the email gateway level.

Anti-phishing policy with impersonation protection: In Defender for Office 365 Plan 1 or Plan 2, configure an anti-phishing policy with user and domain impersonation protection:

  1. Add protected users: list all executive email addresses, key finance staff, HR leadership, and accounts payable contacts. Defender monitors for emails that appear to impersonate these specific addresses.
  2. Add protected domains: add your organization's domains, key partner domains, and domains of major vendors you regularly receive invoices from.
  3. Enable mailbox intelligence: allows Defender to learn normal communication patterns and flag anomalous senders.
  4. Set action to quarantine for impersonation detections rather than junk folder, so finance staff do not accidentally act on quarantined BEC attempts.

Configure via PowerShell:

New-AntiPhishPolicy -Name "BEC Protection" `
  -EnableTargetedUserProtection $true `
  -TargetedUsersToProtect @("ceo@yourdomain.com", "cfo@yourdomain.com", "ap@yourdomain.com") `
  -TargetedUserProtectionAction Quarantine `
  -EnableOrganizationDomainsProtection $true `
  -EnableMailboxIntelligence $true `
  -EnableMailboxIntelligenceProtection $true `
  -MailboxIntelligenceProtectionAction Quarantine

External sender tagging: Enable external sender warnings that prepend a visual warning to emails from outside the organization. This prevents attackers from using display name spoofing (setting display name to "CEO Name" in a personal email account) to bypass employee vigilance. In Exchange Online:

Set-ExternalInOutlook -Enabled $true

Monitor for inbox rule manipulation: A common post-compromise persistence technique is creating inbox rules that forward all email to an external address or delete emails matching certain keywords (to intercept vendor communications or hide BEC fraud notices). Monitor for inbox rule creation events in the Microsoft 365 unified audit log:

Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) `
  -Operations "New-InboxRule","Set-InboxRule" | Select-Object CreationDate, UserIds, Operations, AuditData

Alert on any inbox rule that forwards to an external address or deletes email from finance, accounting, or vendor domains.

Process Controls: Callback Verification and Dual Authorization

Technical controls reduce the volume of BEC attempts that reach employees, but process controls determine whether employees who receive BEC attempts act on them. Process controls are the highest-confidence BEC prevention mechanism because they provide out-of-band verification that a purely email-based attack cannot circumvent.

Callback verification policy: The single most effective BEC process control: any request received via email to change payment details, transfer funds, update banking information, or take financial action outside the normal purchase order process must be verified via phone call to a contact at a number from your internal directory, not from the contact information provided in the email.

Implementation: document this policy in writing, include it in finance and HR onboarding, and train employees that verifying a request is always acceptable and encouraged. The attacker cannot impersonate the CFO on a phone call to the CFO's known mobile number.

Dual authorization for wire transfers: Require two separate employee approvals for any wire transfer above a defined threshold (commonly $10,000 to $25,000 for SMBs, higher for enterprises). The approval request must come through your accounts payable system, not via email chain. This prevents a single compromised or deceived employee from authorizing fraud unilaterally.

New vendor payment approval: Require that any new vendor or first payment to a vendor be approved by a manager and verified against a known contact at the vendor organization before payment is processed. This prevents the payroll-style attack where an attacker sets up a fraudulent vendor before submitting invoices.

Wire transfer delay and review window: Implement a 24-hour review window before wire transfer processing for transfers above the threshold, unless the business need is documented and approved by two managers. This creates a window for employees who suspect fraud to pause the transaction without creating an emergency.

Train employees on "Friday afternoon urgency": BEC actors frequently send requests late on Friday afternoon or before holidays, when verification is harder and employees are more likely to process urgent requests without standard controls. Train employees that urgency framing in financial requests is a red flag, not a legitimate reason to bypass verification.

Detection and Response: Identifying BEC and Recovering Wire Transfers

Detecting BEC in progress and recovering funds after a successful transfer requires rapid action. Wire transfers can sometimes be recovered if reported within 72 hours of execution.

Detection signals for active BEC:

  • Inbox rules created to forward email to external addresses or delete email matching finance keywords
  • Authentication from unusual geographies immediately before a suspicious financial request
  • Email from a new domain claiming to be from a known vendor requesting payment detail changes
  • Executive account logins outside normal hours or locations
  • Outbound email from executive accounts to unfamiliar external domains

Microsoft Sentinel detection query for inbox rule anomalies:

OfficeActivity
| where Operation in ("New-InboxRule", "Set-InboxRule")
| where Parameters has "ForwardTo" or Parameters has "RedirectTo" or Parameters has "DeleteMessage"
| project TimeGenerated, UserId, Operation, Parameters
| order by TimeGenerated desc

Immediate response when BEC is suspected:

  1. Preserve all email evidence before taking remediation action
  2. Check whether a wire transfer has been initiated through your financial institution
  3. If a transfer has been initiated: call your bank immediately to request a recall. Banks have specific procedures for fraud-related recalls; speed is critical as funds can be moved out of the receiving account within hours.

FBI IC3 reporting and fund recovery: If a wire transfer was executed, report immediately to the FBI Internet Crime Complaint Center (ic3.gov) and to your bank's fraud department. The FBI operates the Financial Fraud Kill Chain (FFKC) process for domestic transfers and coordinates with foreign law enforcement for international transfers. Reporting within 72 hours of execution significantly increases recovery probability. Include: date/amount of transfer, receiving bank name and account number, and all email correspondence related to the fraud.

Post-incident controls: After any BEC incident (including near-misses where the fraud was stopped before transfer): reset all credentials for the accounts involved, review for other compromised accounts, audit all inbox rules tenant-wide, and update callback verification procedures if the incident exposed a gap.

The bottom line

BEC defense is a combination of three control categories: email authentication (DMARC at p=reject prevents domain spoofing), process controls (callback verification eliminates the attack's core mechanism), and detection (monitoring for inbox rule manipulation and authentication anomalies catches account compromise-based BEC before funds move). DMARC is the highest-leverage technical control and can be deployed within weeks. Callback verification is the highest-leverage process control and costs nothing to implement. Together, they address the vast majority of BEC attack variants. If a transfer does succeed, reporting to the FBI IC3 within 72 hours is the only mechanism for potential fund recovery.

Frequently asked questions

What is the difference between BEC and phishing?

Phishing is a broad category of social engineering attacks delivered via email, typically including malicious links or attachments designed to steal credentials or install malware. BEC is a specific subset of email fraud focused on financial theft through social engineering, with no malware or malicious links. BEC attacks impersonate trusted parties (executives, vendors, colleagues) and manipulate employees into authorizing wire transfers or divulging sensitive information. Because BEC contains no malicious payload, it bypasses most technical email security controls that rely on link scanning or attachment sandboxing.

Does DMARC stop all BEC attacks?

DMARC at p=reject stops BEC attacks that rely on spoofing your exact domain, which is one of the two primary delivery mechanisms. It does not stop BEC attacks using lookalike domains (yourcompany-billing.com), attacks using a compromised legitimate email account, or attacks using free email services with display name spoofing. DMARC is a necessary but not sufficient BEC control. The callback verification process control provides coverage for attack variants that DMARC cannot address.

Can you recover money lost to BEC wire fraud?

Recovery is possible but requires immediate action within 72 hours of the fraudulent transfer. Contact your bank's fraud department immediately to request a wire recall and file a complaint with the FBI Internet Crime Complaint Center (ic3.gov). The FBI's Financial Fraud Kill Chain process has recovered hundreds of millions of dollars in BEC fraud. Recovery probability drops sharply after 24 to 48 hours as funds are moved through intermediate accounts or converted to cryptocurrency. Domestic transfers have higher recovery rates than international transfers.

What is the most common BEC attack against small businesses?

Vendor impersonation and invoice fraud are the most common BEC attacks against small businesses because they exploit the lack of formal vendor payment processes. An attacker registers a domain similar to a real vendor, sends a convincing invoice or payment detail update request, and collects payment that was intended for the legitimate vendor. CEO fraud (executive impersonation) is more common against mid-size and larger organizations where the finance team does not have direct access to the executive to verify unusual requests.

How does multi-factor authentication protect against BEC?

MFA protects against BEC attacks that begin with account compromise: if an attacker cannot steal credentials to access a legitimate email account, they cannot send BEC emails from that account. MFA does not protect against BEC attacks that use spoofed domains, lookalike domains, or display name impersonation without account compromise. Implementing MFA on all email accounts and using phishing-resistant MFA (FIDO2) for executives reduces the account compromise vector significantly, but must be combined with DMARC and process controls for comprehensive BEC defense.

What should the callback verification policy say?

The policy should specify: any request received by email to change payment details, bank account numbers, or wire transfer destinations must be verified by phone call to the requestor using a phone number from the company directory or a previously established contact record, not from any number provided in the email or voicemail related to the request. The policy should apply to all vendor payment changes, executive financial requests, payroll bank account changes, and real estate or M&A wire instructions. Exceptions require written approval from two managers and documentation of the business justification.

How do attackers research organizations before launching BEC attacks?

BEC attackers use OSINT extensively before targeting. LinkedIn provides executive names, titles, reporting relationships, and email format patterns. Corporate websites reveal executive names and company structure. EDGAR filings and press releases reveal M&A activity, supplier relationships, and financial data. Job postings reveal the accounting software, ERP systems, and processes in use. Attackers often monitor target organizations for weeks before launching, timing the attack to coincide with real events (board meetings, quarter-close, vendor payment cycles) to increase credibility.

Sources & references

  1. FBI IC3 Internet Crime Report 2023
  2. CISA: Business Email Compromise Guide
  3. Microsoft: Protect Against BEC Attacks
  4. NIST: Email Authentication Mechanisms (SP 800-177)
  5. FBI: Business Email Compromise Public Service Announcement

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.