Phone : +91 95 8290 7788 | Email :

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Business Email Compromise (BEC) Scams: A deep insight on how attackers leverage social engineering tricks to perform BEC scams

Business Email Compromise (BEC) Scams: A deep insight on how attackers leverage social engineering tricks to perform BEC scams

Business Email Compromise (BEC) is a type of scam that targets corporate companies that pay bills via wire transfers. BEC scammers targeting employees of corporate companies mostly impersonate the company’s CEO or senior executives. These scammers use social engineering techniques to trick employees into sending funds directly to the scammers.

Types of BEC Scams

According to the FBI, there are five types of BEC scams:

  • Bogus Invoice Scheme – This scheme is also known as the ‘Supplier Swindle’ and ‘Invoice Modification Scheme’. This scheme often targets companies with suppliers abroad. These scammers impersonate the suppliers and request payment via wire transfer to an account controlled by the scammers.
  • CEO Fraud – In this type of scam, attackers compromise CEO or a senior executive’s email account and use it to send emails to employees requesting money transfer to the account controlled by them.
  • Account Compromise – Scammers compromise targeted employees’ email accounts and send email to multiple vendors requesting payment via wire transfer to the scammers’ accounts.
  • Attorney Impersonation – In this case, scammers impersonate lawyers who are in charge of confidential matters and request payment from victims.
  • Data Theft – In this scam type, attackers target employees PII, social security number and tax statements to be used for various other attack campaigns.

Examples of BEC scams

Example 1 – BEC scam targeting employees’ paycheck

In January 2019, BEC scammers targeted employees paycheck. These scammers sent spoof emails to the HR department impersonating the employees and requesting the HR to change their direct deposit information and divert monthly salary paycheck to a fake account controlled by the scammers.

Example 2 – BEC scammers exploiting a Gmail feature

In February 2019, Business Email Compromise (BEC) scammers were exploiting a Gmail feature ‘Dot accounts’ to perform various fraudulent activities such as filing for fake tax returns, filing for fake unemployment benefits, and more.

Gmail’s ‘Dot accounts’ is a feature of Gmail addresses that ignores dot characters inside Gmail usernames, regardless of their placement. Scammers were taking advantage of this feature and creating multiple email accounts to perform various fraudulent activities.

For example, scammers leveraged this feature to trick Netflix account owners into adding card details to scammers’ accounts.

BEC scammers switching to mobile

Recently researchers noted that scammers are adopting SMS as a communication platform for BEC attacks as mobile devices are easier to facilitate attacks. For which, these scammers are using temporary US-based phone numbers and are utilizing services such as Google Voice to perform multiple attacks from the same US number.

How to stay protected?

  • It is always best to use two-factor authentication while logging in to your email accounts.
  • To stay protected from such attacks it is important for organizations to train their employees on how to react to emails or SMS that request any sort of financial task.
  • It always best to ensure the sender’s email address and confirm directly with the sender in person or via phone call regarding the email.
  • Experts recommended users to never open any email or attachments that come from anonymous senders.

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India













What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.


Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.


Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : | Support Email :

Register & Request Quote | Submit Support Ticket