Business Email Compromise
Reduce invoice fraud, executive impersonation, and credential theft driven by email. Get clearer verification steps and safer approvals across high-risk workflows.
what is business email compromise
Business Email Compromise (BEC) is a targeted email fraud where attackers impersonate a trusted person or supplier to redirect money, steal credentials, or change payment details. It often looks legitimate, uses real business context, and relies on urgency and authority to bypass normal checks.
Bank details change, invoice “correction”, or a request to pay to a “new” account.
A message that appears to come from leadership, pushing urgent approval or confidentiality.
Fake sign-in prompts that lead to mailbox takeover and follow-up fraud.
Attackers win when approvals are ad-hoc and verification steps are unclear.
“Please update the beneficiary details for the next transfer.”
“Approve this payment now—keep it confidential.”
bec business email compromise
“BEC” is simply the common shorthand for Business Email Compromise. In practice, it covers fraud scenarios that target finance, procurement, and executives—where a single mistaken approval can be expensive.
BEC Protection
BEC protection works when teams know what to do next. Pair detection with clear steps for verifying payment requests, link destinations, and identity claims—especially when urgency is used as pressure.
The supplier “updates” the beneficiary or account number.
A revised invoice arrives with a new PDF and urgent tone.
“Pay today to avoid penalties” is used to bypass checks.
Confirm details using an approved contact list or call-back.
Invoice Fraud
Invoice fraud is one of the most common BEC outcomes. Attackers aim to change payment details at the last moment, often using a compromised mailbox or a look-alike domain.
CEO Fraud
CEO fraud targets employees who can move money or access systems. The message often demands urgency and secrecy, and it may arrive outside normal processes to prevent verification.
Credential Theft
Credential theft often precedes BEC. Once an attacker has access to a mailbox, they can monitor conversations, time requests perfectly, and use real threads to make fraud look legitimate.
Links that mimic common login portals to capture passwords.
Stolen access is used to send follow-up fraud from real accounts.
“Password reset” and “verify your account” messages drive clicks.
Inspect destinations before credentials are entered.
Email Fraud
Email fraud includes BEC, impersonation, invoice manipulation, and credential lures. The most effective defense combines detection, verification habits, and a simple reporting workflow.
- Verify payment and bank-detail changes with a call-back or approved contact list.
- Open known portals directly instead of logging in from email links.
- Report suspicious messages so patterns are caught earlier next time.