Business Email Compromise is not a flashy cyberattack. There is no ransomware payload, no system lockdown, no dramatic notification. Instead, someone on your finance team receives a routine-looking email from what appears to be your CEO: 'I need you to process an urgent wire transfer before end of day. Handle this discreetly.' They send the money. The CEO knew nothing about it. The FBI estimates that BEC has cost businesses worldwide more than $50 billion in cumulative losses since 2013 — and the attacks keep getting more sophisticated as AI tools make spoofing more convincing than ever.
In 2026, BEC attacks are increasingly automated and AI-enhanced. Attackers use large language models to craft flawless, context-aware impersonation emails. They study LinkedIn, company websites, and previous email threads to make their requests feel completely authentic. Small and mid-sized businesses are primary targets because they have less formal approval processes and fewer controls than enterprises. This guide explains how BEC attacks work, what the red flags look like, and how to build both technical and procedural defenses that stop them.
How BEC Attacks Actually Work in 2026
Understanding the mechanics of BEC attacks is essential for building effective defenses. Modern BEC is not a single technique — it is a category of social engineering fraud that takes several forms:
CEO Fraud
The attacker impersonates your CEO, CFO, or another executive and emails a finance employee or accounts payable team member with an urgent request to wire funds, purchase gift cards, or change a supplier's bank account details. The email may come from a spoofed domain (identical-looking to your real one) or from a compromised executive account.
Vendor Invoice Fraud
The attacker impersonates a trusted supplier or vendor, sending a convincing invoice with updated bank account details. Payments go to the attacker's account instead of the real vendor. This is especially effective when an attacker has previously compromised the vendor's email account and can see real invoice threads to replicate.
Account Compromise
Rather than spoofing an email address, attackers compromise a legitimate email account (via phishing or credential stuffing) and send fraudulent requests directly from the real address. These are the hardest to detect because the emails pass all authentication checks.
Payroll Diversion
The attacker impersonates an employee and contacts HR or payroll, requesting that direct deposit information be changed to a new bank account. The next payroll run goes to the attacker.
In all cases, AI-generated text has made these attacks far more convincing. Gone are the days of obvious grammar errors. Modern BEC emails are polished, contextually accurate, and timed to coincide with real business events like quarterly closes, vendor renewals, or executive travel.
Technical Controls That Stop BEC
Email security technology is your first line of defense. These controls should be in place before you worry about procedural safeguards.
- DMARC, SPF, and DKIM: Configure strict email authentication on your domain so that spoofed emails claiming to be from your domain are rejected by receiving servers. See our guide on setting up SPF, DKIM, and DMARC for step-by-step instructions.
- Anti-spoofing rules: Configure your email platform to flag or quarantine emails that fail SPF/DKIM checks or that claim to be from your domain but arrive from external servers.
- Display name spoofing detection: Many BEC attacks use a display name matching your CEO or CFO but a completely different email address. Email security tools like Microsoft Defender for Office 365, Abnormal Security, or Proofpoint can detect and flag display name impersonation.
- Lookalike domain monitoring: Attackers register domains that look like yours (motasimfoad.com might be spoofed as motasimf0ad.com or motasimfoad-invoice.com). Services like DomainTools or PhishLabs monitor for newly registered lookalike domains and alert you so you can proactively warn staff.
- MFA on all email accounts: Compromised accounts cannot be used for BEC if the attacker cannot bypass MFA. Enable MFA on every email account, especially executive accounts.
Procedural Controls: Your Most Powerful Defense
Technology alone cannot stop BEC. The most effective BEC defenses are procedural — policies and processes that make it impossible to complete a fraudulent transaction even if an email gets through.
Dual Authorization for Wire Transfers
No wire transfer, large payment, or vendor bank account change should be processed based on an email request alone, regardless of who it appears to be from. Require a phone call or video call to verify, using a number from your existing records (not a number provided in the suspicious email). This single control stops the overwhelming majority of BEC financial fraud.
Callback Verification Policy
Establish a written policy: any request to change payment details (bank account numbers, payment destinations) requires verbal verification with a known contact using a pre-established number. Train all finance, HR, and operations staff on this policy and make it non-negotiable — even when the request appears to come from the CEO.
Payment Amount Thresholds
Set approval thresholds that require sign-off from two or more people for transactions above a certain amount. Most small businesses set this somewhere between five and twenty-five thousand dollars, depending on their normal transaction volumes.
Vendor Bank Account Change Protocol
Never update a vendor's bank account details based solely on an emailed request. Call your vendor contact directly using the number you have on file. Ask them to confirm the change through your established relationship. Log all bank account changes and who verified them.
Want help putting this into practice?
Book a free 30-minute strategy call — I'll review your current setup and map out the next 3 high-impact steps for your business.
Book a Free Strategy Call →Training Your Team to Recognize BEC
Even with strong technical and procedural controls, employees are the last line of defense. BEC attacks specifically target people under time pressure — urgency is the most common manipulation tactic. Training your team to recognize the pressure and slow down is critical.
Key red flags to train your team to spot:
- Urgency and secrecy: 'Do this before end of day' and 'keep this between us' are classic BEC signals. Legitimate executives rarely demand complete secrecy on financial transactions.
- Requests outside normal channels: A CEO who normally uses Slack suddenly making an email-only request, or a vendor who normally sends invoices through your procurement system emailing a PDF directly.
- Slight email address differences: [email protected] vs [email protected]. Train staff to look at the actual email address, not just the display name.
- Requests to deviate from process: Any request to skip a normal approval step — especially framed as urgent or confidential — should trigger heightened skepticism, not compliance.
Run periodic simulated BEC attacks through platforms like KnowBe4 or Proofpoint Security Awareness. These simulations specifically test employee response to CEO fraud and vendor impersonation scenarios. Measure click and compliance rates and use the data to target additional training.
What to Do If BEC Succeeds
Despite best efforts, BEC attacks do succeed. If your business falls victim to a fraudulent wire transfer, speed is everything.
- Call your bank immediately: Most banks have a fraud hotline. The first 24 to 72 hours are critical for recovering wire transfers. If the funds have not yet been withdrawn from the recipient account, a bank recall may be possible.
- File a complaint with law enforcement: In the US, report to the FBI Internet Crime Complaint Center (IC3) and request a Financial Fraud Kill Chain. In Canada, report to the Canadian Anti-Fraud Centre. In the UK, contact Action Fraud. These agencies have coordination mechanisms that can assist with bank recalls in some cases.
- Notify your cyber insurer: Most cyber insurance policies cover BEC losses. Notify your insurer as soon as possible and follow their reporting process precisely — late notification can affect coverage.
- Preserve evidence: Do not delete the fraudulent emails. Screenshot them, forward them to your IT team and insurer, and preserve email headers. This is critical for law enforcement and insurance purposes.
- Review and harden: Conduct a post-incident review. How did the attack get through? What procedural gap allowed the transfer to be processed? Update your controls and training immediately.
If you want to assess your current BEC exposure and put the right controls in place, contact us for a free initial consultation.
AI-Enhanced BEC: The 2026 Threat Landscape
The use of AI in BEC attacks has changed the game. Where attackers once relied on generic templates and hoped for the best, they now use large language models to:
- Generate perfectly written, contextually accurate impersonation emails based on scraped information about your business from websites, LinkedIn, news articles, and leaked email threads
- Synthesize voice audio that sounds like your CEO using publicly available recordings for vishing (voice phishing) attacks via phone or voicemail
- Create real-time deepfake video on video calls to impersonate executives in virtual meetings — a technique that has already been used in documented multi-million dollar fraud cases
In 2024, a Hong Kong company lost tens of millions of dollars after an employee was deceived by a deepfake video call impersonating the company's CFO. These are no longer theoretical scenarios.
The defenses against AI-enhanced BEC are the same as against traditional BEC — but more important than ever. Verification procedures must be robust enough to catch scenarios where an email, voice, or even a video call cannot be trusted at face value. Pre-established code words or out-of-band verification channels (a separate text to a known personal number) are becoming standard in high-risk organizations. We cover the full deepfake threat in our post on deepfake social engineering.
Frequently Asked Questions
How do attackers know enough about my business to impersonate my CEO?
Attackers invest significant time in reconnaissance before executing a BEC attack. They study your company website, LinkedIn profiles, press releases, and social media to understand your hierarchy, relationships, and communication style. They may also purchase leaked email data or breach your email system first to read real correspondence. The more information publicly available about your business, the easier this research is.
Can BEC attacks be stopped by email filters alone?
Email filters are an important layer but not sufficient on their own. Sophisticated BEC attacks often use compromised legitimate accounts (which pass all authentication checks) or lookalike domains that slip through filters. Procedural controls — particularly callback verification for any payment or bank account change request — are equally important and arguably more reliable than technology alone.
Is BEC covered by standard business insurance?
Standard commercial crime or fidelity insurance may cover BEC losses, but coverage varies significantly by policy. Many insurers have added specific BEC exclusions or sublimits in response to the volume of claims. Cyber insurance policies typically provide broader BEC coverage. Review your specific policy language carefully and consult your insurance broker to ensure you have adequate coverage.
How do I know if our business email account has already been compromised?
Signs of a compromised email account include: unfamiliar forwarding rules that quietly copy outbound email to an external address, sent emails that the account holder did not write, login activity from unusual locations or devices in the audit log, and unexpected password reset or MFA change notifications. Reviewing email account audit logs (available in Microsoft 365 and Google Workspace admin consoles) regularly is the best detection method.
What is the most effective single control to prevent BEC financial losses?
Dual-authorization callback verification for any payment or bank account change. Requiring a phone call to a pre-established number to confirm any wire transfer or payment detail change, regardless of how authoritative the email request looks, stops the vast majority of BEC fraud before money leaves the business. This procedural control costs nothing to implement and is more reliable than any technical control.
Ready to protect your business from BEC attacks?
Book a free 30-minute strategy call and we will review your email security setup, payment verification procedures, and employee awareness posture — and give you a clear action plan to close your gaps.
Book a Free 30-Minute Strategy Call →