What is BEC (Business Email Compromise)?
Business Email Compromise (BEC) is a targeted email fraud technique where attackers impersonate executives, vendors, or trusted partners to trick employees into wiring money, changing payment details, or sharing sensitive data. BEC is the costliest category of cybercrime by losses.
How BEC works
Three-step view of how it operates in practice.
Research
Attackers identify the target — usually finance, HR, or executive assistants. They study public information, prior emails, vendor relationships.
Impersonate
The attacker spoofs a known sender (CEO, CFO, vendor AP contact) or compromises a real mailbox and sends from it directly.
Request
A plausible request arrives: wire a payment, update vendor banking details, buy gift cards, send a payroll file. The sense of urgency and legitimate voice bypass normal checks.
Common BEC patterns
A clear breakdown of the common variants.
CEO fraud
Attacker impersonates the CEO asking finance to urgently wire funds.
Vendor invoice fraud
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Attorney impersonation
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
W-2 / payroll fraud
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why BEC matters for SMBs
Business Email Compromise (BEC) is a targeted email fraud technique where attackers impersonate executives, vendors, or trusted partners to trick employees…
Common BEC mistakes
- Treating email as authoritativeAny payment change or unusual wire must be verified by voice on a known-good number. Not the number in the email.
- No out-of-band verification policyAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- Weak banking detail change processA documented, multi-step process for vendor bank changes prevents many BEC variants.
- Skipping executive mailbox protectionCEO and CFO mailboxes are prime targets. Enforce the strictest controls (phishing-resistant MFA, conditional access) on these accounts.
BEC frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Is your wire-transfer process BEC-resistant?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.