A Complete Guide to the CEO Fraud Business Email Compromise Phenomenon

complete guide to the CEO fraud business email image
complete guide to the CEO fraud business email image


“Hi, Jane – I’m on a conference call right now. I can’t talk on the phone but let me know if you got my text. Thanks.”

John Doe (CEO)

Chances are, you’ve either received a message like this or know someone who has. Business email compromise attacks (BECs) continue to increase as cybercriminals advance their techniques to ensnare as many victims as possible. Cyber attackers evolve social engineering tactics to take advantage of human interactions, manipulating employees into breaking standard security procedures and best practices to gain unauthorized access to systems, networks, and information. Even with traditional cybersecurity measures in place, these cybercriminals can penetrate an organization through its employees, often without their knowledge, making CEO fraud detection harder to spot.  

What is Business Email Compromise?

The FBI defines business email compromise as a “sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.” These can be one of the most financially damaging online crimes, exploiting the fact that so many rely on email to conduct personal and professional business. 

CEO Fraud

The John Doe example above references a mass-scale CEO scam, a growing strain of business email compromise attacks that attempt to trick employees into thinking a high official at their company wants them to send money. Also known as CEO fraud, this particular tactic relies on a sense of urgency and authority while playing off employees’ desire to be helpful. According to the FBI Internet Crime Complaint Center’s (IC3) Internet Crime Report, the IC3 received 21,832 BEC complaints, with adjusted losses of approximately $2.7 billion last year. Also of note, the IC3 saw a slight increase of targeting victims’ investment accounts instead of traditional bank accounts.

Now that the workforce is much more dispersed because of the pandemic, CEO fraud thrives in taking advantage of the various methods and tools many use to stay connected within an organization. Just a few years ago, business email compromise scams began gaining popularity by spoofing the email accounts of C-suite members, with fraudulent emails requesting wire payments be sent to unauthorized locations. As these cybercriminals have grown more sophisticated, the scam has evolved to include other compromised or spoofed accounts (personal emails and text messages), tax information requests, and favors such as purchasing gift cards. The schemes only continue to evolve, making CEO fraud harder to detect.

Emotions of Social Engineering

We’re all human, and humans have emotions.
Learn the Emotions of a Social Engineering Attack so they don’t get the best of you.

How Cybercriminals Leverage Social Engineering

Before conducting  business email compromise schemes, cybercriminals do extensive research to ensure their best chance of success. In an effort to collect information on their target, threat actors often peruse the company’s website, social media pages, and media coverage prior to their attack. This research will result in a variety of information, including:

  • Names, titles, and email addresses of executive and high-level employees 
  • Employees in finance, payroll, and HR roles 
  • Company information or other notable events, projects, or news 
  • The names of new employees 
  • Customers, vendors, or partners of the organization  
  • Out-of-office notifications or personal social media posts about senior leadership being away

Cybercriminals use this information to target employees more effectively to convince them to click a link, send funds, provide login credentials, and more. With more employees working remotely, it has become more challenging to verify requests face-to-face, and new technology collaboration tools can also be spoofed to complicate the attack further’ you’ve probably received an email mimicking a message from Slack that looks just like their branding, for example. Just as the threats evolve, we must adapt our capabilities to spot and stop these attacks before they get too far. 

The Answer to CEO Fraud Detection

1. Train your team

Outside of cybersecurity specialists, most people have never received education related to cybersecurity, or they’ve had very basic training. However, employees are the first line of defense against cyberattacks, particularly in the case of business email compromise. As such, they should be enabled with the proper training and guidance to best prepare them for potential threats. Cybersecurity awareness training on an annual (or better yet, quarterly) basis is no longer enough, as threat actors change their tactics frequently. Organizations must conduct frequent, realistic, and engaging training, especially with new employees, who are prime targets for business email compromise attacks.

2. Spread the word

Further, it’s important that employees know what information is being posted and how cyber-attackers can use it against employees. For example, if your organization is hosting a charity golf event, let your team know there might be an uptick in illegitimate requests to buy gift cards and other scams tied to the event. Not having clearly defined and communicated policies can leave the door open for employees to fall victim to potential social engineering attacks, including CEO fraud. Many are simply unaware of how the information they post and the systems or tools they use can open themselves and the organization up to increased risk. 

3. Set expectations and plan ahead

Organizations also need clear policies and processes for employees to follow in the event of a potential threat. Developing an incident response plan for business email compromise is crucial to mitigate the possible repercussions of such an attack. The faster fraud is reported, the higher the chance any funds or data might be recoverable. We also recommend having standard procedures in place for responding to any payment or data requests, either by contacting the alleged sender directly in another way or by having another employee confirm the request’s legitimacy. 

4. Get back to basics

Finally, implementing basic cybersecurity measures can go a long way in preventing widespread impact in a business email compromise attack. Upholding best practices like creating unique passwords and enabling multi-factor authentication make it more difficult for cybercriminals to take over accounts, ultimately buying your organization some much needed time in the case of an incident. Enable spam filters, which catch most phishing messages from landing in your company’s inboxes.

Cybersecurity isn’t just about tools and software; rather, it requires leveraging people, processes, and technology for a comprehensive and adaptable posture. This approach to CEO fraud detection and other business email compromise scams can go a long way in protecting organizations from evolving cyber threats. Through consistent, engaging employee training and by putting standardized policies and plans in place, every employee can play a significant role in keeping their organization safe.

Ready to take the first step toward a comprehensive cybersecurity posture? Let’s talk.

Resources & insights

Blog
The 3 B's: Getting Buy-In for Data Security Policies and Procedures
Data security policies and procedures may not seem like the most exciting secret weapons when it comes to fighting cybercrime, but they play an important role in your organization's defense against breaches. Learn how to get your full team on board with our 3 B's of getting buy-in across your organization.
The top phishing and social engineering techniques in hacking
Blog
The Top Phishing and Social Engineering Techniques in Hacking
Bolstering your organization’s knowledge is the best first step in combatting cyber threats. By spreading awareness and encouraging understanding of the top phishing and social engineering techniques in hacking, teams can better protect themselves against cyber-risks.
Blog
Social Engineering Awareness Training for Employees: The Framework
We believe that your team can be your strongest line of defense in preventing cyberattacks, provided they receive proper social engineering awareness training. Consistent training, combined with straightforward policies,  and a culture of cybersecurity will enable your employees to be able to identify a threat and make the right decisions should they encounter a social engineering attempt. 

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.

Take the first step toward comprehensive cybersecurity with a free Defendify Essentials package

Gain access to 3 award-winning cybersecurity modules. Nothing to install. Nothing to pay for.