In recent months, many businesses have approached us saying they are seeing an uptick in business email compromise (BEC) or CEO fraud attacks. For instance, a hacker spoofs emails from a company’s CEO asking the accounting department to pay an invoice or perform a wire transfer.

BEC is an increasingly common and damaging form of cybercrime. Data from the FBI shows that between October 2013 and December 2023, BEC resulted in over $20 billion U.S. exposed dollar loss. In a BEC attack, hackers heavily rely on social engineering tactics to manipulate employees into sharing confidential data or transferring funds. Attackers use highly personalized and contextual email communication – rather than malware – to bypass email security filters. And, the rise of generative AI (GenAI) has further allowed hackers to create very convincing emails to deceive their targets.

This is why businesses are coming to us to better understand how these attacks work and to tighten their email security defenses. In this blog post, we provide a comprehensive look at BEC, including common tactics and what your business can do to protect against BEC attacks.

audit icon

what is business email compromise (BEC)?

Business email compromise (BEC) is a very targeted form of phishing. In a BEC attack, hackers use a spoofed or compromised email account to impersonate a company’s CEO, vendor, or other stakeholders to trick the recipient into transferring funds or sharing sensitive data. CEO fraud is one of the most common BEC plays, where hackers send out fraudulent emails that appear to come from a company’s CEO or other C-level executives.

Today, hackers have many tools to research a business. A quick LinkedIn scan can tell them exactly who to target and GenAI tools like ChatGPT can help them draft a realistic message without common red flags like grammatical errors.

Finance and HR employees are common targets for BEC scams because they have access to valuable data like personal identifiable information (PII) and payment systems. New employees and interns are also favorable targets because they may be less familiar with the company’s policies and more likely to act on ‘urgent’ requests from a spoofed or hijacked CEO account.

testing-icon

common business email compromise (BEC) tactics & techniques

Hackers use different tactics and techniques to carry out BEC attacks. Here are a few common tactics we see used often.

r

Domain spoofing

Hackers create fake email domains that appear legitimate at first glance. They make subtle changes, like a lowercase l instead of a capital L, or gravoc-technology.com instead of gravoc.com. These alterations can be easy to miss and trick recipients into trusting the sender.

r

Compromised accounts

Hackers can acquire or steal credentials to compromise an email account. Once they have control of the account, they can monitor and insert themselves into ongoing communications to get the recipients to transfer funds or share information. For instance, hackers may hijack a finance team member’s account to join an email thread and provide updated banking details for an invoice payment.

q

CEO fraud

We see this type of BEC attacks very often in the field. Hackers pretend to be the CEO or another C-level executive within a company and write to employees requesting urgent wire transfers, gift card purchases, or access to sensitive documents.

Very often, hackers use social engineering techniques like creating a sense of urgency or panic to manipulate their targets into responding quickly without verifying the legitimacy of the request.

r

Inbox rules

Many times, hackers may create inbox rules to automatically forward emails to their own accounts or mark them as read, allowing them to mask their presence and perpetuate a BEC attack.

testing-icon

best practices & solutions to protect against business email compromise (BEC)

R

Employee security awareness training

Provide your employees, especially those in BEC-favored targets like finance and HR, with extensive employee security training that focuses on social engineering tactics. Include modules that train your employees to spot social engineering red flags like urgent language, lookalike domains, and mismatched ‘reply to’ addresses.

You should also ensure employees receive adequate communication and documentation around policies for financial transactions, including steps for oversight and approval. This way, they will be better equipped to recognize unusual requests that deviate from approved company processes.

R

Enforce SPF, DKIM, and DMARC

Make sure your email domain is properly configured with SPF, DKIM, and DMARC. These protocols work together to authenticate your email traffic. DMARC, when configured with a “reject” or “quarantine” policy, adds a solid enforcement layer that helps mitigate fraudulent messages from reaching your employees’ inboxes.

R

User access and identity management controls

Enable multi factor authentication across every account, enforce conditional access controls, and review privileges regularly. It’s also important to ensure account credentials are regularly updated and managed. The goal is to reduce the risk of an account takeover by making it harder for an attacker to gain or maintain access.
R

Implement advanced email security tools

Use a solution like KnowBe4 Defend to spot sophisticated BEC attacks that traditional gateways might miss. Leveraging machine learning, natural language processing, and natural language understanding, Defend detects the attacks that get through native security and Secure Email Gateways, including business email compromise.

If an incoming email appears risky, KnowBe4 Defend also includes contextual color-coded HTML warning banners to alert users to the level of risk. The tool comes with many other features to strengthen your business’ security posture.

knowbe4-defend-banners
knowbe4 defend
Cloud

looking to strengthen your email security and defend against BEC?

Business Email Compromise is a growing threat, but you can manage the risks with the right solutions and employee training. At GraVoc, we have partnered with KnowBe4 to help businesses tighten their email security with tools like KnowBe4 Defend, as well as ensure ongoing employee awareness training to spot and mitigate attacks.

Interested in learning more? Check out our IT infrastructure services or contact us today to get started!

Related articles