Business Email Compromise Scam Examples
Please include details of the scam contact you received for example the email or screenshot.
Business email compromise scam examples. According to the federal bureau of investigation fbi 2019 was the worst year on record. Also known as ceo fraud w 2 phishing email account compromise and business email spoofing the con comes in two basic varieties. 10 24 2018 business email.
Learn how to spot scams targeted at your business. Business email compromise bec is a type of phishing scheme where the cyber attacker impersonates a high level executive cio ceo cfo etc and attempts to get an employee or customer to transfer money and or sensitive data. Business email compromise fraud includes several types of sophisticated frauds targeted at businesses.
Your report helps to warn people about current scams monitor trends and disrupt scams where possible. Learn how you and your employees can spot business email compromise bec fraud. Business email compromise email account compromise is a sophisticated scam that targets both businesses and individuals who perform legitimate transfer of funds requests.
Business email compromise bec scams have become increasingly commonplace and financially destructive. Corporate or publicly available email accounts of executives or high level employees related to finance or involved with wire transfer payments are either spoofed or compromised through keyloggers or phishing attacks to do fraudulent transfers resulting in hundreds of. En espaƱol business email compromise or bec is a fast growing type of phishing scam in which fraudsters impersonate company owners or executives to trick employees of the firm into transferring money or turning over confidential data.
Business email compromise bec is a type of scam targeting companies who conduct wire transfers and have suppliers abroad. From 2016 2018 bec alone made 5 3 billion 1 but it s not an attack that everyone is familiar with. The links and email addresses included in these messages are from real life examples do not attempt to explore them.