πŸ” Dashboard πŸ“‘ Pulse βœ‰οΈ Inbox Shield πŸ›‘οΈ BrandGuard 🏒 Workspace Posture πŸ“‘ Vendor Watch πŸ“‹ Compliance 🎣 PhishSim πŸ”§ MSP Plan
Email Security BEC Social Engineering

Business Email Compromise (BEC): How to Spot and Stop Attacks in 2026

The FBI's 2025 IC3 report recorded $2.9 billion in BEC losses β€” more than ransomware, more than any other cybercrime category. Unlike most attacks, BEC doesn't need malware. It just needs a convincing email and someone who wires money, changes a bank account, or hands over credentials without double-checking. Here's how these attacks work, the red flags to catch them, and the nine controls that prevent them.

What Is Business Email Compromise?

Business email compromise is a fraud scheme where attackers impersonate a trusted party β€” your CEO, a supplier, your HR department, or a legal team β€” to trick employees into taking a harmful action. That action is usually one of:

The defining feature: there is no malicious link, no attachment, no malware. It's pure social engineering delivered via email. That's why traditional spam filters and antivirus software catch almost none of it.

The 5 BEC Attack Types

πŸ‘”
CEO Fraud / Executive Impersonation Most Common
Attacker impersonates the CEO or CFO, urgently requesting a wire transfer

A finance employee receives an email appearing to come from the CEO: "I'm in a board meeting. Need you to process an urgent wire to our new vendor β€” $47,500. I'll explain the details later, keep this quiet for now." The from address is either a lookalike domain ([email protected]) or a compromised real account.

πŸ“¦
Vendor / Supplier Invoice Fraud
Attacker intercepts or spoofs supplier emails to redirect payments

An email arrives that looks like your regular supplier's invoice, but the bank account details have changed. "Please use our new account effective immediately β€” reply to confirm." Attackers either compromise the supplier's email or spoof their domain.

πŸ‘©β€πŸ’Ό
HR / Payroll Diversion
Attacker impersonates an employee to redirect their salary

Before payroll runs, an attacker posing as an employee emails HR: "Hi, I recently changed banks. Can you update my direct deposit to [new account] before the next pay run?" The employee doesn't know until they check their bank statement.

βš–οΈ
Attorney / Legal Impersonation
Attacker poses as legal counsel to create urgency and secrecy

A recipient gets an email purportedly from the company's law firm: "We're handling a confidential acquisition. The CEO has authorized a $130,000 escrow transfer. Due to the sensitive nature, do not discuss with colleagues." The urgency and confidentiality both serve to bypass normal approval processes.

🎁
Gift Card Scam
Attacker requests gift card purchases with codes sent via email

Often targeting small businesses, the "CEO" requests an employee buy $500–$2,000 in Amazon or iTunes gift cards for "client gifts" or an "employee appreciation event," then asks for photos of the codes. Quick, irreversible, and surprisingly common.

How Attackers Prepare a BEC Attack

BEC is not random. Attackers spend days or weeks on reconnaissance before sending a single email:

  1. LinkedIn research: Identify the CFO, accounts payable staff, and HR contacts. Map reporting structures.
  2. Domain reconnaissance: Find your domain, check DMARC records (if p=none or missing, your domain can be spoofed freely). Register lookalike domains.
  3. Email pattern enumeration: Confirm email format (firstname.lastname@, f.lastname@, etc.) using tools like Hunter.io or leaked breach data.
  4. Calendar and OOO timing: Attackers send wire fraud emails when the CFO is traveling, in a conference, or on holiday β€” reducing the chance the target will call to verify.
  5. Account compromise (advanced): In some cases, attackers compromise a real email account first and read months of threads before inserting themselves into an active supplier conversation.

Key insight: Over 60% of BEC attacks involve a domain that either spoofs your exact domain (no DMARC) or uses a registered lookalike. If your DMARC policy is p=none, attackers can send email that appears to come from your CEO's exact address β€” with zero account compromise required.

Red Flags in BEC Emails

9 Controls That Stop BEC

CONTROL 01

Enforce DMARC p=reject

Prevents attackers from spoofing your domain. Without it, anyone can send email appearing to come from [email protected]. Check your record at Inbox Shield.

CONTROL 02

Out-of-band verification for wire transfers

Require a phone call or in-person confirmation β€” using a pre-stored number, never one provided in the request β€” before processing any wire transfer over a set threshold.

CONTROL 03

Dual-approval for payroll changes

Direct deposit changes should require approval from two people, with a mandatory waiting period before the change takes effect.

CONTROL 04

Email banner for external senders

Configure your email system to prepend a visible "[EXTERNAL]" banner on any email originating outside your domain. Attackers relying on lookalike domains are instantly exposed.

CONTROL 05

Monitor lookalike domain registrations

Attackers register typosquatted domains weeks before the attack. Real-time monitoring catches company-corp.com, cornpany.com, and homoglyph variants before they're used. BrandGuard does this automatically.

CONTROL 06

Audit email forwarding rules

When attackers do compromise an account, their first move is to create a forwarding rule to silently copy all emails to an external address. Audit these monthly in M365 and Google Workspace.

CONTROL 07

Enable anti-impersonation in M365 / Google

Defender for Office 365 and Google Workspace both have impersonation protection for specific users (executives) and trusted domains. Enable and tune it with your executives' names.

CONTROL 08

BEC-specific employee training

Run tabletop BEC simulations β€” not just generic phishing drills. Finance and HR teams need specific scenarios around wire fraud, payroll diversion, and W-2 requests. PhishSim covers BEC scenarios.

CONTROL 09

Limit public org chart exposure

Review what LinkedIn, your website, and press releases reveal about your finance org structure. Attackers use this to identify the right targets. Job listings that say "reports to CFO" are especially useful to them.

The DMARC–BEC Connection

Of all nine controls, DMARC enforcement is the single highest-leverage technical change. Here's why it matters so much:

DMARC Policy Attacker can spoof your domain? Where spoofed emails go
p=none or no record Yes β€” freely Delivered to inbox, no warning
p=quarantine Yes, but limited Junk/spam folder (often checked)
p=reject No β€” rejected at server Never delivered

The transition from p=none β†’ p=quarantine β†’ p=reject should be gradual, monitoring reports at each stage to ensure legitimate senders aren't accidentally blocked. See our full guide: DMARC p=reject vs p=quarantine β€” which policy should you set?

What to Do If You Receive a Suspicious Email

Time is critical for recovery: The FBI's Recovery Asset Team (RAT) has a >70% success rate recovering BEC wire transfers β€” but only when notified within 24 hours. If you've been hit, call your bank and file with IC3 at ic3.gov immediately.

BEC in M365 and Google Workspace Environments

Most BEC attacks in 2026 involve a fully compromised Microsoft 365 or Google Workspace account β€” not just a spoofed address. Once an attacker has access to a real inbox, they can:

This is why account security in M365 and Google Workspace is inseparable from BEC prevention. Weekly audits of forwarding rules, OAuth app access, and unusual sign-in locations catch compromised accounts before attackers can do damage. Workspace Posture Pro runs these checks automatically every Monday and alerts you to anything suspicious.

BEC Prevention Checklist

Check Your Domain's BEC Exposure in 60 Seconds

See if your domain can be spoofed right now, whether lookalike domains have been registered against you, and what email security gaps attackers are likely to exploit.

Check With Inbox Shield β€” Free β†’