CyberGlossary

Attacks & Threats

Business Email Compromise

Also known as: BEC, Email account compromise (EAC)

Definition

A targeted fraud in which an attacker impersonates or takes over a corporate mailbox to trick an employee into wiring money, changing payment details, or sending sensitive data.

Business Email Compromise (BEC) typically combines reconnaissance, social engineering, and either spoofed mail or a hijacked legitimate account. Common scenarios include CEO fraud, vendor invoice redirection, payroll diversion, and W-2 / data-theft variants. BEC rarely requires malware; the leverage comes from authority, urgency, and trusted email channels, which is why it consistently ranks among the costliest cybercrimes per incident. Defences combine DMARC alignment with reject, mandatory MFA and Conditional Access on mailboxes, out-of-band verification of payment changes, accounting controls, anomaly detection on mail flow rules, and recurring user training.

Examples

  • A finance clerk receives a forged "CEO" email asking for a same-day wire to a new supplier account.
  • A supplier's hijacked mailbox sends a real invoice with updated bank details that route payment to the attacker.

Related terms