Business Email Compromise (BEC): How to Spot and Stop Attacks in 2026
The FBI's 2025 IC3 report recorded $2.9 billion in BEC losses β more than ransomware, more than any other cybercrime category. Unlike most attacks, BEC doesn't need malware. It just needs a convincing email and someone who wires money, changes a bank account, or hands over credentials without double-checking. Here's how these attacks work, the red flags to catch them, and the nine controls that prevent them.
What Is Business Email Compromise?
Business email compromise is a fraud scheme where attackers impersonate a trusted party β your CEO, a supplier, your HR department, or a legal team β to trick employees into taking a harmful action. That action is usually one of:
- Wiring money to an attacker-controlled account
- Paying a fake invoice with updated banking details
- Handing over W-2s or employee PII (tax fraud)
- Forwarding credentials or granting access
- Purchasing gift cards and sending redemption codes
The defining feature: there is no malicious link, no attachment, no malware. It's pure social engineering delivered via email. That's why traditional spam filters and antivirus software catch almost none of it.
The 5 BEC Attack Types
A finance employee receives an email appearing to come from the CEO: "I'm in a board meeting. Need you to process an urgent wire to our new vendor β $47,500. I'll explain the details later, keep this quiet for now." The from address is either a lookalike domain ([email protected]) or a compromised real account.
An email arrives that looks like your regular supplier's invoice, but the bank account details have changed. "Please use our new account effective immediately β reply to confirm." Attackers either compromise the supplier's email or spoof their domain.
Before payroll runs, an attacker posing as an employee emails HR: "Hi, I recently changed banks. Can you update my direct deposit to [new account] before the next pay run?" The employee doesn't know until they check their bank statement.
A recipient gets an email purportedly from the company's law firm: "We're handling a confidential acquisition. The CEO has authorized a $130,000 escrow transfer. Due to the sensitive nature, do not discuss with colleagues." The urgency and confidentiality both serve to bypass normal approval processes.
Often targeting small businesses, the "CEO" requests an employee buy $500β$2,000 in Amazon or iTunes gift cards for "client gifts" or an "employee appreciation event," then asks for photos of the codes. Quick, irreversible, and surprisingly common.
How Attackers Prepare a BEC Attack
BEC is not random. Attackers spend days or weeks on reconnaissance before sending a single email:
- LinkedIn research: Identify the CFO, accounts payable staff, and HR contacts. Map reporting structures.
- Domain reconnaissance: Find your domain, check DMARC records (if
p=noneor missing, your domain can be spoofed freely). Register lookalike domains. - Email pattern enumeration: Confirm email format (firstname.lastname@, f.lastname@, etc.) using tools like Hunter.io or leaked breach data.
- Calendar and OOO timing: Attackers send wire fraud emails when the CFO is traveling, in a conference, or on holiday β reducing the chance the target will call to verify.
- Account compromise (advanced): In some cases, attackers compromise a real email account first and read months of threads before inserting themselves into an active supplier conversation.
Key insight: Over 60% of BEC attacks involve a domain that either spoofs your exact domain (no DMARC) or uses a registered lookalike. If your DMARC policy is p=none, attackers can send email that appears to come from your CEO's exact address β with zero account compromise required.
Red Flags in BEC Emails
- Unusual urgency + secrecy: "Process this immediately" combined with "don't mention this to anyone" β the two most reliable BEC markers.
- Request for a new or changed bank account: Legitimate vendors rarely change banking details mid-relationship. Any bank change should trigger a phone verification.
- Email from a lookalike domain:
[email protected]instead of[email protected]. The display name looks right; the actual sending address doesn't. - Reply-to address differs from the from address: Classic indicator of spoofing. Check both in your email client.
- Request to bypass normal process: "Skip the normal PO process for this one." The process exists specifically to catch BEC.
- Gift card requests: No legitimate executive asks employees to purchase and forward gift card codes. Ever.
- Unusual send time: A "CEO email" sent at 2 a.m. from their personal device while traveling β when they're unavailable to verify β is a common pattern.
9 Controls That Stop BEC
Enforce DMARC p=reject
Prevents attackers from spoofing your domain. Without it, anyone can send email appearing to come from [email protected]. Check your record at Inbox Shield.
Out-of-band verification for wire transfers
Require a phone call or in-person confirmation β using a pre-stored number, never one provided in the request β before processing any wire transfer over a set threshold.
Dual-approval for payroll changes
Direct deposit changes should require approval from two people, with a mandatory waiting period before the change takes effect.
Email banner for external senders
Configure your email system to prepend a visible "[EXTERNAL]" banner on any email originating outside your domain. Attackers relying on lookalike domains are instantly exposed.
Monitor lookalike domain registrations
Attackers register typosquatted domains weeks before the attack. Real-time monitoring catches company-corp.com, cornpany.com, and homoglyph variants before they're used. BrandGuard does this automatically.
Audit email forwarding rules
When attackers do compromise an account, their first move is to create a forwarding rule to silently copy all emails to an external address. Audit these monthly in M365 and Google Workspace.
Enable anti-impersonation in M365 / Google
Defender for Office 365 and Google Workspace both have impersonation protection for specific users (executives) and trusted domains. Enable and tune it with your executives' names.
BEC-specific employee training
Run tabletop BEC simulations β not just generic phishing drills. Finance and HR teams need specific scenarios around wire fraud, payroll diversion, and W-2 requests. PhishSim covers BEC scenarios.
Limit public org chart exposure
Review what LinkedIn, your website, and press releases reveal about your finance org structure. Attackers use this to identify the right targets. Job listings that say "reports to CFO" are especially useful to them.
The DMARCβBEC Connection
Of all nine controls, DMARC enforcement is the single highest-leverage technical change. Here's why it matters so much:
| DMARC Policy | Attacker can spoof your domain? | Where spoofed emails go |
|---|---|---|
p=none or no record |
Yes β freely | Delivered to inbox, no warning |
p=quarantine |
Yes, but limited | Junk/spam folder (often checked) |
p=reject |
No β rejected at server | Never delivered |
The transition from p=none β p=quarantine β p=reject should be gradual, monitoring reports at each stage to ensure legitimate senders aren't accidentally blocked. See our full guide: DMARC p=reject vs p=quarantine β which policy should you set?
What to Do If You Receive a Suspicious Email
- Do NOT reply to the email β even to ask if it's legitimate (you're replying to the attacker)
- Do NOT call any phone number provided in the email
- Use a pre-stored contact number to call the apparent sender directly
- Forward the suspicious email to your IT or security team as an attachment (not forwarded normally)
- Check the actual sending address β not just the display name
- Check the reply-to address if it differs from the from address
- If a payment was already sent, call your bank immediately β recovery is only possible within hours
- File a complaint with the FBI's IC3 (ic3.gov) if money was transferred
Time is critical for recovery: The FBI's Recovery Asset Team (RAT) has a >70% success rate recovering BEC wire transfers β but only when notified within 24 hours. If you've been hit, call your bank and file with IC3 at ic3.gov immediately.
BEC in M365 and Google Workspace Environments
Most BEC attacks in 2026 involve a fully compromised Microsoft 365 or Google Workspace account β not just a spoofed address. Once an attacker has access to a real inbox, they can:
- Read existing email threads and inject themselves naturally into ongoing supplier conversations
- Set up silent forwarding rules to monitor communications indefinitely
- Send from the legitimate address (bypassing all DMARC and anti-spoofing controls)
- Create inbox rules that hide their own sent emails and delete replies
- Access calendar invites to time wire fraud requests when key approvers are unavailable
This is why account security in M365 and Google Workspace is inseparable from BEC prevention. Weekly audits of forwarding rules, OAuth app access, and unusual sign-in locations catch compromised accounts before attackers can do damage. Workspace Posture Pro runs these checks automatically every Monday and alerts you to anything suspicious.
BEC Prevention Checklist
- DMARC record set to
p=reject(or actively transitioning from quarantine) - SPF record published and all legitimate sending sources included
- DKIM configured for your primary domain and all email-sending services
- Out-of-band verification required for all wire transfers above your threshold
- Dual-approval process in place for direct deposit / payroll changes
- External email banners enabled in M365 / Google Workspace
- Impersonation protection enabled and executives' names configured
- Lookalike domain monitoring active (alerts on new registrations)
- Monthly audit of email forwarding rules across all user accounts
- Finance and HR teams trained on BEC-specific scenarios (not just generic phishing)
Check Your Domain's BEC Exposure in 60 Seconds
See if your domain can be spoofed right now, whether lookalike domains have been registered against you, and what email security gaps attackers are likely to exploit.
Check With Inbox Shield β Free βGet new security guides in your inbox
Practical, no-fluff posts on email security, BEC, and protecting your business. No spam.