Skip to main content
Threat Analysis

Business Email Compromise (BEC): The $50 Billion Scam

EmailsThreatScan Team
Feb 07, 2026
8 min read
Spoofed CEO email with hacker puppet master illustration
Move to explore

It starts with a simple email: "Are you at your desk? I need a wire transfer processed immediately." The sender looks like your CEO. The request is urgent. But it's a lie that costs businesses billions every year.

What is BEC?

Business Email Compromise (BEC) is a type of cybercrime where an attacker compromises legitimate business email accounts or uses spoofing to conduct unauthorized transfers of funds.

Unlike ransomware or viruses, BEC attacks rarely use malicious links or attachments. They rely purely on Social Engineering—manipulating people into making a mistake.

The Two Main Flavors

1. CEO Fraud

The attacker pretends to be a high-level executive (CEO, CFO) and emails an employee in the finance department.

  • The Hook: "I'm in a meeting / on a plane and can't talk."
  • The Ask: "Process this urgent vendor payment focusing on confidentiality."
  • The Target: Junior employees who are afraid to say "no" to the boss.

2. Vendor Invoice Fraud

The attacker compromises the email account of a real vendor you work with. They monitor the email threads, waiting for an invoice to be sent.

At the last moment, they intercept the conversation:
"Hi, our bank details have changed due to an audit. Please send payment to this new account number..."

This is devastating because the email comes from the real vendor's address (since they were hacked). No spam filter will catch it.


Three-step BEC attack flow: register lookalike domain, send urgent request, money wired
BEC attacks move fast by design — urgency is the weapon, not malware.

Red Flags to Watch For

1. Extreme Urgency

"Do this immediately", "Confidential", "Before the cutoff time". Scammers need you to act fast so you don't think.

2. "Can't talk right now"

The scammer claims to be unreachable by phone to prevent you from verifying the request.

How to Protect Yourself

The best defense against BEC is a simple process change: Always verify out-of-band.

If you receive a request to change bank details or wire money:

  1. Do NOT reply to the email.
  2. Call the person/vendor on a trusted phone number (from your internal directory or their website, not the email signature).
  3. Verify the request verbally.

Technical Defense

While BEC relies on psychology, header analysis can still catch them.

Caught a Suspicious "CEO" Email?

Before you reply, check the headers for a mismatched Reply-To address. Our tool surfaces these red flags in seconds.

Analyze Header Mismatches