IsThisAScam
Ana SayfaBlogFiyatlandırmaHakkımızdaHistoryAPIExtension
Upgrade
TR
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Ürün
  • Home
  • Blog
  • Pricing
  • Hakkımızda
  • History
  • Chrome Extension
Resources
  • Developers
  • API Belgeleri
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Yasal
  • Gizlilik Politikası
  • Hizmet Şartları
  • product@zeplik.com

© 2026 Zeplik, Inc. Tüm hakları saklıdır.

Built for the calm, the cautious, and the careful.

Home/Glossary/Business Email Compromise (BEC)
Glossary · Scam Type

What Is Business Email Compromise (BEC)?

A sophisticated scam targeting businesses where criminals compromise or impersonate legitimate business email accounts to authorize fraudulent wire transfers, divert payroll, or steal sensitive data.

Quick Definition

A sophisticated scam targeting businesses where criminals compromise or impersonate legitimate business email accounts to authorize fraudulent wire transfers, divert payroll, or steal sensitive data.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Business Email Compromise (BEC) explained.

BEC is the most financially devastating type of cybercrime, with the FBI reporting over $2.7 billion in losses in the US alone in 2022. Unlike mass phishing, BEC attacks are carefully researched and targeted, often involving surveillance of a company's email systems before striking.

Attackers may gain access to a real executive's email through phishing or credential theft, then use that legitimate account to send fraudulent instructions. Alternatively, they may use lookalike domains (e.g., company-inc.com instead of companyinc.com) to send convincing emails.

BEC attacks target the people who handle money: accounts payable clerks, finance directors, and HR staff. Common tactics include fake CEO requests for urgent wire transfers, fraudulent vendor invoices with updated bank details, and payroll diversion requests.

02How it works.

01Attackers research the target organization, identifying key personnel and business processes
02They compromise a legitimate email account or register a lookalike domain
03A convincing email is sent to an employee authorized to make financial transactions
04The email requests an urgent wire transfer, vendor payment change, or payroll redirect
05The employee, trusting the apparent sender, completes the transaction before verifying

03Real-world example.

In 2019, Toyota Boshoku Corporation, a Toyota subsidiary, lost $37 million to a BEC attack. Scammers impersonated a business partner and convinced a finance executive to change wire transfer payment details. The money was sent to the attacker's account, and most could not be recovered.

04How to protect yourself.

01Implement mandatory dual-authorization for all wire transfers and payment changes
02Verify any change in payment instructions through a phone call to a known number
03Deploy email authentication (SPF, DKIM, DMARC) to prevent domain spoofing
04Train finance and HR staff to recognize BEC red flags: urgency, secrecy, and new payment details
05Use IsThisAScam to analyze suspicious business emails before acting on them
Related Terms
WhalingSpear PhishingSpoofingSocial Engineering
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →