Rapid Reads News

HOMEmiscentertainmentcorporateresearchwellnessathletics

Exposing Business Email Compromise: How Fraudsters Infiltrate Trusted Relationships


Exposing Business Email Compromise: How Fraudsters Infiltrate Trusted Relationships

It started with a simple email - and ended with a $670,000 loss.

Business email compromise, also known as BEC, is not just a theoretical cyberthreat. It is a growing and costly reality impacting public and private organizations across the globe. Entities in every sector and industry are being targeted by BEC scammers. While there are different means that a BEC scammer can use to execute a BEC, the end game is always the same, to convincingly request fraudulent and unauthorized funds transfers. In one recent case, fraudsters successfully diverted hundreds of thousands of dollars from a government entity by impersonating a trusted vendor and manipulating standard payment procedures.

Organized groups of fraud scammers are focused on BEC as their preferred method of fraud scam as it is extremely lucrative. Local businesses, large corporations, government entities and individuals are all being targeted.

Small and medium sized businesses are often more vulnerable because they typically have high trust cultures, fewer internal controls, a lack of employee training and limited cybersecurity resources. Larger businesses are also susceptible. In 2017, Google and Facebook lost more than $100 million USD to a fraud threat group using a BEC phishing scheme. Using fake email accounts, designed to mimic employee accounts of a purported business partner, phishing emails with fake invoices were sent to employees who "regularly conducted multi-million-dollar transactions" with the purported business partner. The targeted employees responded by paying out more than $100 million to a fake company's bank accounts.

In 2024, reports revealed a sharp rise in compromised employee-linked accounts across Fortune 500 companies, with more than three million accounts exposed between 2022 and 2024. This trend highlights the significant risks posed by leaked credentials, which can enable account takeovers, business email compromise scams, fraud and data breaches.

Awareness is key. Training is essential.

If your company has never been the target of a BEC, it is helpful to understand the typical trajectory of a BEC scheme. In this article, we break down how one construction company and government entity fell victim to a targeted BEC attack and offer tips and resources to help you reduce your organization's exposure.

A Closer Look: Fraudsters Scam $670,000 from a Government Entity

In 2024 an accounts payable clerk for a government entity responded to a purported vendor's email request to change its bank account information. After the clerk completed the bank account change, payments of approximately $670,000 were processed and diverted to a non-vendor bank account.

The vendor account targeted in this incident was a construction company that was an established vendor of record for the government entity.

How did the Business Email Compromise Occur?

The fraudsters committed the crime by attempting to conceal their identity by:

How was the Fraud Identified?

After the initial breach, the fraudster also sent an additional email that included a fictitious invoice for $320,000 for an apparent outstanding account and requested immediate payment. The email raised questions about the vendor account and the clerk reached out to the construction company by phone. As a result, the BEC scheme was discovered.

The bank was immediately notified, and the construction company launched a cyber incident investigation. At the same time, the government entity hired external legal counsel and a forensic accountant and launched its own investigation. The incident was also reported to the police.

To recover the transferred funds, the government entity filed a statement of claim against the bank and recovered $240,000 that remained in the scammer's bank account. Forensic accountants traced the remaining funds disbursed from the scammer's bank account to other accounts, which revealed that the remaining funds were dissipated by the fraudster and no further assets were identified for recovery purposes

Best Practices for Reducing BEC Risk

An informed and engaged workforce is crucial to preventing losses from BEC, and other frauds and cybercrimes.

How can a forensic investigator help?

Forensic investigators and accountants play a vital role in helping entities prevent and manage frauds and scams like BEC. These specialized professionals conduct detailed investigations to gather financial facts and evidence, review internal controls and vendor data management systems to identify weaknesses / vulnerabilities and provide recommendations to improve systems to assist in the prevention and deterrence of future potential fraud incidents. In the aftermath of an incident, they work as part of the investigation team to identify the fraudsters, trace funds, identify the perpetrator's assets and support the recovery efforts. Forensic accountants often prepare expert reports for insurance claims, civil proceedings and for purposes of reporting incidents to the police, ensuring all findings are documented and defensible. They also deliver targeted employee training to raise awareness of BEC tactics, helping staff recognize red flags and reduce the likelihood of future risks of BEC attacks and exposure.

There is no time like the present to take inventory of your vulnerabilities, especially as they relate to business email compromise, a prevalent area of fraud. Click here to download a one-page guide that will help you identify common risk factors that could put your entity in jeopardy.

Previous articleNext article

POPULAR CATEGORY

misc

6146

entertainment

6743

corporate

5497

research

3517

wellness

5587

athletics

6831