eCommerce Fraud Knowledge Guide

Business Email Compromise

  1. Articles
  2. eCommerce Fraud
  3. Business Email Compromise
  4. What is Business Email Compromise?
Business Email Compromise

Knowledge Guide Chapters

  1. What is Business Email Compromise?
  2. Common Business Email Compromise Tactics
  3. Business Email Compromise Statistics
  4. Business Email Compromise Examples
  5. How to Identify Business Email Compromise
  6. How to Prevent Business Email Compromise

What is Business Email Compromise?Is the Person on the Other End of That Email Who They Claim to be?

David DeCorte | November 19, 2025 | 3 min read
What is Business Email Compromise?

What is a Business Email Compromise Scam? Definitions & Overview

You get an email from a trusted party. Maybe your boss, or a coworker. Then, you find out weeks later that the person you’d been corresponding with was never who they claimed to be. You’ve just been hit with a business email compromise scam.

A typical BEC attack involves four basic steps: identifying a target, gaining access to the target account, conducting the attack, and then disappearing with the desired funds or data. But, how does that really work? Let’s get into it.

Business Email Compromise

The FBI calls business email compromise “the $26 billion dollar scam.” How is that possible? This article will take a close look at BEC scams to explain what they are, why they’re such an expensive problem, and also how you and your employees might be targeted.

What is a Business Email Compromise Scam?

Business Email Compromise

[noun]/biz • nəs • ē • māl • käm • prə • mīz/

Business email compromise, commonly abbreviated to BEC, is a scam conducted through email. With a BEC attack, an email will appear to come from a legitimate source within the business. However, the sender is an imposter attempting to trick other members of the organization to divulge sensitive information.

Business email compromise is not a conventional form of transaction fraud. Nonetheless, it's one of the costliest business scams active today.

Attackers that use BEC tactics exploit the fact that professionals and companies rely heavily on email for interpersonal communication to conduct business. In many cases, the scammer makes a request that could seem reasonable at first glance. The target sees the name on the email and, without thinking twice, provides the information requested.

To illustrate, imagine that an employee gets an email from one of your executives. The message says to buy a bundle of gift cards for employee rewards. Then, once the purchase has been made, the “executive” requests the serial numbers in order to email them out immediately... but then disappears with the gift cards. That’s just one example.

While directors and people in the C-Suite are common targets, scammers may potentially attack anyone within your company. A simple email could lead to losses in the thousands or even millions of dollars.

How Do BEC Scams Work?

TL;DR

A typical BEC attack involves four basic steps: identifying a target, gaining access to the target account, conducting the attack, and then disappearing with the desired funds or data.

Contrary to other scams, business email compromise attacks don't require advanced technical skills.

Scammers don’t need to be savvy hackers; they can simply dig through public sources like LinkedIn to uncover the information they need to launch an attack, like email addresses, professional titles, and other business details. This low barrier to entry means that BEC scams yield significant returns with relatively little effort.

In a typical BEC attack, fraudsters will do the following:

Target Identification

Step #1 | Target Identification

The attacker researches potential targets and selects a business to attack. They focus on individuals with authority to request or make payments, such as executives, legal representatives, and accounting staff.

Scheme Preparation

Step #2 | Scheme Preparation

The scammer prepares by creating fake email domains or by compromising existing accounts. They use targeted methods like spearphishing to gain access, and may spend days or weeks "grooming" other employees through subtle communication to build trust, appear legitimate, and avoid suspicion.

Execution of the Attack

Step #3 | Execution of the Attack

The attacker instructs other workers to initiate a fraudulent payment or provide sensitive information, like account credentials or banking details. While these communications are designed to appear ostensibly harmless, the scammer’s ultimate goal is to convince others to send funds or data to an external account.

Data or Financial Extraction

Step #4 | Data or Financial Extraction

Funds or sensitive data is inadvertently transferred into the scammer's hands. Once in the attacker’s possession, money or valuable information is quickly dispersed across multiple accounts to hinder recovery. If not caught, the fraudster vanishes.

The last point is why a rapid response to cybersecurity incidents is so critical: a delay of just a few hours can mean the difference between recouping or losing millions of dollars.

Next Chapter

Common Business Email Compromise Tactics

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form