Business Email Compromise: What It Is and How to Prevent It

Business Email Compromise (BEC) is one of the most costly forms of cyber fraud targeting U.S. businesses. Criminals gain access to real email accounts and use that access to manipulate payments and steal funds.
In one case, a local Iowa business had its email hacked and taken over by a fraudster. The attacker changed just one letter in the business’s email domain, then sent fake invoices to several of the company’s vendors, attempting to redirect payments into the scammer’s account.
Situations like this are becoming more common. Discover how BEC works, how attackers gain access, what your business can do to stop it, and more.
BEC scams lead to billions in financial losses every year.
Criminals often access emails through phishing or credential theft.
Prevention requires email security, staff training, and offline verification.
Quick action increases the chances of recovering lost funds.
Business Email Compromise happens when a criminal uses a legitimate email account to trick someone into sending money. This is often a vendor payment or internal funds transfer.
The attacker may spend days or weeks monitoring the inbox before striking. They look for patterns, scheduled payments, and communication between departments or external vendors. Then they send a message that appears to come from someone the target trusts.
According to the FBI’s IC3 2023 report, Business Email Compromise is a sophisticated scam targeting both businesses and individuals, with 21,489 complaints and over $2.9 billion in reported losses, most involving unauthorized fund transfers carried out through compromised email accounts.
Business Email Compromise does not start with a wire transfer. It begins quietly, often with a stolen login, a compromised network, or a misled employee. Attackers gain access well before they take action, using one of several common entry tactics.
Phishing emails that trick someone into entering credentials
Network breaches where attackers capture passwords silently
Credential stuffing that uses data from past breaches to log in
Once a scammer is inside the account, they don’t take immediate action. They study communication habits and wait for a payment-related conversation to appear.
Once attackers gain access to an email account, they move carefully. Their goal is to avoid detection while preparing to redirect funds. These are the most common tactics:
Spoofed email addresses or fake domains: Scammers send messages from addresses that closely resemble a legitimate one, such as @abc-co.com instead of @abcco.com.
Inbox forwarding rules: They create hidden rules that automatically forward emails or move them to other folders, making it harder for the victim to notice anything unusual.
Urgency or last-minute changes: Messages often include phrases like “I need this paid today” or “I’m traveling and not available.” The goal is to pressure the recipient into acting without double-checking.
Recognizing these tactics early is key to stopping the scam before money leaves your account.
FSB’s ACH Positive Pay lets you review and approve debits before they post. Keep control of your payments and block unauthorized transactions.
The most effective way to stop a Business Email Compromise is to prevent it from happening in the first place.
While no system is perfect, following these best practices can significantly reduce your risk of falling victim to a BEC attack:
Use multi-factor authentication on all email accounts. This adds a second layer of protection and makes it harder for scammers to access your inbox using stolen credentials.
Enable external sender alerts. A simple visual cue that highlights outside emails can help staff recognize spoofed or suspicious messages.
Verify all payment or banking changes offline. Call the person or business using a known phone number, not the number listed in the email.
Train your team regularly. Teach employees how BEC scams work, how to spot urgent or unusual requests, and what steps to take if something feels off.
Secure similar domain names. Register domains that closely resemble your own to reduce the risk of spoofing.
Limit who can send or approve payments. Role-based permissions and dual control add another layer of oversight.
These steps are not just for large corporations. Small and mid-sized businesses are frequently targeted because they may lack dedicated IT staff or formal payment protocols.
Looking to strengthen your fraud controls? Explore FSB's fraud mitigation services or contact our Treasury Management team to review your setup and identify next steps.
Time is critical in a BEC attack. Once funds are transferred, the chance of recovery drops fast.
If you suspect your business has been targeted, act immediately and follow these steps:
Call your bank immediately: If you bank with FSB, contact your relationship manager or fraud team to attempt a wire recall or freeze the transaction.
Report the incident to law enforcement: File a report through the FBI’s Internet Crime Complaint Center (IC3). Include all known details to support the investigation and recovery.
Change all passwords and remove inbox rules: Secure the compromised account by updating credentials and deleting any forwarding or filtering rules the attacker may have set up.
Use alternate channels for urgent communication: Switch to a secure backup email or call key contacts directly. Avoid replying within the compromised thread.
Work with IT to investigate the breach: Preserve email logs, system activity, and any other evidence that may help identify the source of the attack.
Notify internal teams and affected partners: Keep leadership, accounting, vendors, and staff informed so everyone is aligned on next steps and no further damage occurs.
Quick action not only increases the chance of recovering funds but also helps prevent additional fallout across your operations and vendor relationships.
Business Email Compromise (BEC) is a type of cybercrime where criminals use a compromised or spoofed email account to trick someone into sending money.
Attackers often monitor email conversations and insert themselves at the right moment to send fake payment instructions. The emails appear legitimate, making the fraud hard to detect until the money is gone.
Businesses of all sizes are at risk, but small and mid-sized companies are frequent targets.
They often have fewer internal controls, limited fraud training, and rely on email for approvals and payments. Anyone handling invoices, wire transfers, or vendor payments is a potential target.
Red flags include last-minute banking changes, urgent payment requests, odd phrasing, or slight changes to email addresses or domains.
Always verify payment details offline using a known phone number; never rely solely on the contact information in the questionable email.
Use multi-factor authentication, set up external email alerts, train employees on fraud tactics, and verify payment changes by phone. Limit who can approve transactions and review email rules regularly.
For added protection, use services like ACH Positive Pay or dual control for outgoing payments.
Business Email Compromise is one of the most financially damaging threats facing businesses today, and it’s not going away. The good news is that with the right mix of awareness, tools, and response protocols, you can reduce your risk and act fast if something goes wrong.
Looking to review your current process, strengthen your defenses, or get support if something doesn’t feel right? Reach out to FSB's Treasury Management team to get started!
Learn about the latest business fraud affecting Eastern Iowa organizations.
Recognize the signs of counterfeit money to protect yourself.
Discover how to prevent your checks from being altered and cashed.