Business Email Compromise

by Jon Lober | NOC Technology

The Phishing Scam That Costs Millions

The email looks like it's from your CEO: "I need you to wire $38,000 to this vendor immediately. I'm in a meeting, can't talk, just handle it." Your controller complies. The money vanishes. This is Business Email Compromise, and it cost American businesses $2.74 billion in 2025 alone.


Unlike the obvious phishing emails that promise Nigerian fortunes or claim your password expired, BEC attacks are surgical. They target specific people in your organization who have the authority to move money. They exploit trust, urgency, and routine business processes. And they work because they look exactly like legitimate business communication.


For CFOs, controllers, and business owners in the Greater St. Louis area, understanding BEC is not optional. It is a core financial risk that belongs on the same list as insurance, fraud controls, and cash flow management.


What Is Business Email Compromise?


Business Email Compromise is a type of fraud where criminals impersonate executives, vendors, or business partners to trick employees into wiring money or revealing sensitive information. The FBI classifies it separately from general phishing because of its targeted nature and the scale of losses involved.


Regular phishing casts a wide net. Attackers send millions of emails hoping someone clicks a malicious link. The goal is usually credential theft or malware distribution. BEC is different. Attackers research your company specifically. They learn who handles payments, who reports to whom, and what vendors you work with. Then they craft a single, highly convincing message designed to extract a large payment.


The reason BEC works so well comes down to psychology. These emails exploit the same dynamics that make businesses run smoothly: trust in leadership, responsiveness to urgent requests, and established payment processes. When your CEO asks for something urgently, most employees comply without extensive verification. Attackers know this, and they weaponize it.


BEC is particularly dangerous because it often involves no malware and no malicious links. Email security filters are looking for attachments with viruses or URLs leading to phishing sites. A plain-text email that says "please wire $50,000 to this account" sails right through traditional filters because there is nothing technically malicious about it. The attack is entirely social.


The Anatomy of a BEC Attack


Understanding how these attacks unfold helps explain why they succeed and what controls can stop them. Most BEC attacks follow a predictable pattern across four phases.


The first phase is reconnaissance. Attackers gather information about your organization from public sources. LinkedIn provides org charts and job titles. Company websites list executives. Press releases announce partnerships and major deals. Court filings, regulatory records, and social media fill in the gaps. In some cases, attackers compromise a low-level email account first just to observe internal communication patterns, learning who approves payments, what the normal request language looks like, and which vendors receive regular payments.


The second phase is spoofing or compromise. Attackers either spoof an executive's email address (making emails appear to come from ceo@yourcompany.com when they actually originate elsewhere) or they compromise the executive's actual email account through credential phishing. Account compromise is more dangerous because replies go to the real attacker-controlled mailbox and the emails pass all authentication checks.


The third phase is the ask. The attacker sends a request that fits normal business patterns. It might be a wire transfer for an "acquisition that must stay confidential," a change in payment details for an existing vendor, or a request for employee W-2 information. The ask always has urgency built in, discouraging the recipient from asking too many questions.


The fourth phase is the transfer. If the employee complies, the money moves to an attacker-controlled account. From there, it typically gets transferred through multiple accounts and often across international borders within hours. By the time anyone realizes what happened, recovery is extremely difficult.


Common BEC Scenarios


CEO fraud is the most recognized BEC variant. An attacker impersonates the CEO or another C-suite executive and requests an urgent wire transfer. These attacks typically target controllers, CFOs, or accounts payable staff. The emails often mention confidentiality ("Don't discuss this with anyone yet, it's a sensitive acquisition") to discourage verification.


Vendor invoice scams compromise or spoof a vendor's email and send updated payment instructions. Because your accounts payable team already expects invoices from this vendor, the request seems routine. The only change is the bank account number, which now routes to the attacker. These attacks are particularly effective because they hijack existing business relationships and trusted payment processes.


W-2 phishing targets HR departments during tax season. Attackers impersonate executives requesting employee W-2 forms or personal information, supposedly for tax purposes or a payroll audit. The data enables identity theft at scale, affecting every employee whose information gets disclosed.


Real estate wire fraud targets the real estate industry specifically. Attackers monitor email accounts of real estate agents, title companies, or attorneys. When a closing approaches, they send fraudulent wire instructions to the buyer. Because real estate transactions involve large sums and tight deadlines, victims often wire hundreds of thousands of dollars before anyone catches the fraud.


Missouri businesses face all of these variants. We have seen St. Louis manufacturing companies targeted with vendor invoice scams, professional services firms hit with CEO fraud, and title companies across the region dealing with wire fraud attempts.


Financial Controls That Stop BEC


Technical defenses matter, but financial controls are your most reliable protection against BEC. Even if a fraudulent email reaches someone's inbox, strong payment processes prevent the wire from going out.


Dual authorization for wire transfers is the single most effective control. Require two people to approve any wire transfer above a threshold amount. The two approvers should not be the same people every time, and the second approver should be someone who can independently verify the legitimacy of the request. This simple control stops most BEC attacks because it forces a second set of eyes on every significant payment.


Callback verification requires anyone processing a wire transfer request to call the requester using a known phone number (not a number provided in the email) to confirm the request is legitimate. If your CEO emails asking for a $50,000 wire, your controller calls the CEO's known cell phone to verify. This takes 60 seconds and stops nearly every CEO fraud attempt.


Payment process changes should require formal documentation. If a vendor sends new bank account information, that change should trigger a verification process that includes calling the vendor at a known number. Never update payment details based solely on an email, even if it appears to come from a trusted contact.


These controls cost nothing to implement. They require only policy changes and staff training. Yet they provide more protection than any technology investment because they address the human element that BEC exploits.


Technical Defenses Against BEC


While financial controls are primary, technical defenses add valuable layers of protection that reduce the likelihood of fraudulent emails reaching your team in the first place.


Email authentication protocols (SPF, DKIM, and DMARC) verify that incoming emails actually originate from the domains they claim to be from. When properly configured, these protocols cause spoofed emails to fail authentication and get quarantined or rejected. Unfortunately, many organizations either have not implemented these protocols or have configured them incorrectly. We have helped St. Louis businesses implement the email security controls that catch these attacks before the wire goes out.


Impersonation protection can detect when incoming emails use display names that match your executives but originate from external addresses. These features flag or quarantine emails where someone outside your organization is pretending to be your CEO.


AI-powered email security tools analyze communication patterns and flag anomalies. If your CEO has never before emailed the accounts payable clerk directly, and suddenly sends an urgent wire request, AI tools can detect that unusual pattern and flag the message for review.


External email warnings add a banner to all emails originating outside your organization. This simple visual cue reminds employees that a message claiming to be from the CEO actually came from an external address, prompting additional scrutiny.


None of these technical controls are foolproof. An attacker who compromises an actual executive's email account will bypass most of them. That is why financial controls remain essential even with robust technical defenses in place.


The Business Case for BEC Prevention


The numbers make the business case clear. The FBI's Internet Crime Complaint Center reported $2.9 billion in BEC losses in 2023. The average loss per incident exceeds $125,000. Recovery rates are low because wire transfers move quickly and cross jurisdictional boundaries.


Cyber insurance provides some protection, but policies increasingly require documented security controls to pay claims. If your policy requires dual authorization for wire transfers and you did not have it in place, the claim may be denied. Insurance is not a substitute for prevention.


The ROI calculation for BEC prevention is straightforward. The cost of implementing dual authorization, callback verification, and email authentication is minimal, mostly staff training and configuration work. The potential loss from a single successful attack runs into six figures. For any business that processes wire transfers, BEC prevention is one of the highest-return risk mitigation investments available.


Missouri businesses of all sizes face this threat. Whether you are a 20-person professional services firm or a 200-person manufacturer, if you wire money, you are a target. The attackers do not care about your industry or location. They care that you have the authority and the processes to move money.


The path forward involves both policy and technology: financial controls that create verification requirements, technical defenses that reduce the volume of fraudulent emails reaching your team, and ongoing training that keeps employees alert to the threat. None of these elements alone is sufficient, but together they make BEC attacks dramatically less likely to succeed.


Curious what gaps exist in your current email security setup? Our pricing page shows exactly what's included in our managed security services, or reach out to discuss BEC prevention specifically.

Frequently Asked Questions

What is the average financial loss from a BEC attack? +
The average BEC incident results in losses exceeding $125,000, according to FBI data. However, losses vary widely based on company size and the nature of the attack. Some incidents involve losses in the millions, while smaller businesses may lose $20,000 to $50,000. The key factor is how much the attacker can convince your team to wire before detection.
Does cyber insurance cover BEC losses? +
Most cyber insurance policies do cover BEC losses under social engineering fraud provisions, but coverage limits and conditions vary significantly. Many policies require you to have specific controls in place (like dual authorization for wire transfers) to pay claims. Review your policy language carefully and work with your broker to understand exactly what is covered before an incident occurs.
How do attackers know who to target in my organization? +
Attackers gather information from LinkedIn (job titles and org charts), your company website (executive bios and press releases), regulatory filings, and social media. In some cases, they first compromise a low-level email account to observe internal communications and learn payment processes before launching the actual attack. Public information about your business gives attackers most of what they need.
What verification procedures should we use for wire transfers? +
Implement two key controls: dual authorization (requiring two people to approve any wire above a threshold amount) and callback verification (calling the requester at a known phone number, not one provided in the email). For vendor payment changes, always verify new bank account information through a phone call to a known contact before processing any updates.
Can email filters stop BEC attacks? +
Email filters catch some BEC attempts, particularly those using spoofed addresses that fail authentication checks. However, BEC emails often contain no malware and no malicious links, making them harder to detect than traditional phishing. If an attacker compromises an actual executive's email account, filters may not flag those messages at all. Technical controls reduce risk but cannot eliminate it.
What is the difference between BEC and regular phishing? +
Regular phishing casts a wide net, sending millions of generic emails hoping someone clicks a malicious link. BEC is highly targeted, with attackers researching specific individuals and crafting personalized messages to extract large payments. Phishing typically aims to steal credentials or deliver malware, while BEC aims to directly extract money through social manipulation.
How quickly can stolen wire transfers be recovered? +
Recovery is difficult and time-sensitive. Once a wire transfer is sent, attackers typically move funds through multiple accounts within hours, often across international borders. The FBI recommends contacting your bank and filing a complaint with the IC3 immediately upon discovery. Success rates for recovery decline sharply after the first 24-48 hours.
Law firm security
By Jon Lober April 22, 2026
Law firm cyber insurance now requires MFA, EDR, backup immutability, and incident response plans. Understand what carriers demand to avoid denied claims in 2026.
employees working together and on computers
By Jon Lober April 21, 2026
Build a phishing training program that actually works. Learn what St. Louis businesses need to teach employees to recognize and report email threats.
remote work security
By Jon Lober April 20, 2026
Protect client data when attorneys work remotely. VPN, encryption, device security, and zero-trust architecture help law firms meet Missouri bar ethics requirements.
More Articles