close online banking
Online Banking Sign-In

Business Email Compromise Scams

A Comprehensive Guide to Prevention and Protection

Business Email Compromise (BEC) scams are a growing threat to businesses of all sizes. These sophisticated attacks target organizations by compromising email accounts or impersonating trusted individuals to manipulate employees into transferring money or providing sensitive information. The consequences can be devastating, ranging from significant financial losses to reputational damage. This comprehensive guide will delve into the intricacies of BEC scams, exploring how they work, the common tactics used, and, most importantly, how to protect your business.


What is a Business Email Compromise (BEC) Scam?

A BEC scam is a type of cybercrime where attackers gain access to a legitimate business email account or impersonate a trusted figure, such as a CEO, CFO, or vendor. They then use this access to deceive employees into performing actions that benefit the attacker, typically involving financial transactions or the release of confidential data. Unlike phishing attacks that are often easily identifiable, BEC scams are highly targeted and personalized, making them incredibly difficult to detect. The FBI's Internet Crime Complaint Center (IC3) has reported significant increases in BEC scams in recent years, highlighting the escalating nature of this threat. 


How Do BEC Scams Work?

BEC scams typically involve several stages:
  1. Reconnaissance: Attackers research their target, gathering information about key personnel, business relationships, and financial processes. This information is often gleaned from social media, company websites, and even public records.
  2. Account Compromise or Impersonation: Attackers may gain access to a legitimate email account through phishing, malware, or other means. Alternatively, they may create a fake email account that closely resembles the address of a trusted individual.
  3. Manipulation: Using the compromised or fake account, the attacker crafts convincing emails that request money transfers, sensitive data, or other valuable assets. These emails often exploit trust and create a sense of urgency.
  4. Execution: The employee, believing the request is legitimate, complies, resulting in financial loss or data breach.


Common BEC Scam Tactics:

  • Fake Invoices: Attackers send fraudulent invoices that appear legitimate, often mimicking the format and style of existing vendors.
  • Urgent Payment Requests: Impersonating a high-ranking executive, attackers demand immediate wire transfers for a "critical" business deal, often citing confidentiality or time sensitivity.
  • Vendor Impersonation: Criminals pose as a vendor, requesting payment information changes and diverting funds to their own accounts.
  • Data Theft: BEC scams can also be used to steal confidential data like customer lists, financial records, or intellectual property.
  • Gift Card Scams: Attackers request employees to purchase gift cards and send them the codes.


How to Spot a BEC Scam:

  • Unusual Email Addresses: Carefully examine the sender's email address. Look for slight misspellings, extra characters, or a different domain than expected.
  • Urgent or Demanding Tone: Be wary of emails that create a sense of urgency or pressure you to act quickly without thinking.
  • Unexpected Requests: Question any requests for money transfers or sensitive information that deviate from your normal business procedures.
  • Grammar and Spelling Errors: While BEC scams are becoming more sophisticated, some may still contain grammatical errors or typos.
  • Requests for Unusual Payment Methods: Be cautious of requests to send money via wire transfer, gift cards, or cryptocurrency, as these are often preferred by scammers.
  • Lack of Verification: BEC emails often discourage employees from verifying the request through other channels.


How to Protect Your Business from BEC Scams:

  • Implement Strong Email Security: Use robust spam filters, anti-virus software, and multi-factor authentication (MFA) for all email accounts. MFA adds an extra layer of security, making it much harder for attackers to gain access even if they have a password. 
  • Train Your Employees: Regularly educate your staff about BEC scams, how to identify them, and the importance of following established security protocols. 
  • Verify Requests: If you receive a suspicious email, especially one involving money or sensitive information, verify the request through a known and trusted communication channel (e.g., phone call). Don't rely on the contact information in the suspicious email.
  • Establish Clear Procedures: Implement strict internal controls for financial transactions, including dual authorization for wire transfers (ACH) and regular reconciliation of accounts. Establish a "no exceptions" policy for unusual requests. Ameris Bank offers Positive Pay, a business fraud prevention measure that identifies and stops fraudulent transactions before they post to the account. 
  • Update Software Regularly: Keep all software, including operating systems and applications, up to date with the latest security patches. Vulnerabilities in outdated software can be exploited by attackers.   
  • Implement DMARC: Domain-based Message Authentication, Reporting & Conformance (DMARC) helps prevent email spoofing by verifying the sender's domain. This can help prevent attackers from impersonating your domain. 
BEC scams pose a significant threat to businesses of all sizes. By understanding how these scams work and implementing the preventative measures outlined in this guide, you can significantly reduce your risk. Regular training, strong email security, and strict financial controls are essential for protecting your business from these sophisticated attacks. Don't wait until it's too late – take proactive steps today to safeguard your organization.

Discover how Ameris can help protect your business from fraud



The opinions voiced in this material are for general information only and are not intended to provide specific advice or recommendations for any individual. Ameris Bank is not affiliated nor endorses the companies referenced in this article.

Sources: 
  1. https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/business-email-compromise# 
  2. https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/multi-factor-authentication#:~:text=MFA%20is%20an%20important%20security,smart%20card%20or%20security%20key
  3. https://dmarc.org