Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

The Definitive Guide to BEC — Business Email Compromise Attacks

Nov 22, 2021

Impersonation-based attacks are one of the oldest tricks in the book. In fact, a recent FBI report, highlights a 136% increase in losses from BEC attacks in the last two years, resulting in $12.5 billion in losses over the course of 5 years.

Gartner denies BEC (Business Email Compromise) as "phishing emails that do not have a payload such as a URL or attachment. Instead they use impersonation and knowledge of the company structure or common transactions to convince employees to wire money or data, or to change bank account information for pending payments."

Impersonation-based attacks are a growing challenge as threat actors are relying on the fact that in the fast-paced modern enterprise, employees are the weakest link in the security chain. Distracted and easily accessible, attackers are capitalizing on their weaknesses to trick them into making mistakes.

Download your copy of this guide to BEC Attacks, and learn about:
• The two main mechanisms in which attackers launch BEC campaigns: Account Takeover & Email Spoofing
• A deep dive into the BEC attack chain
• How to prevent BEC attacks within your organization
• A real life case study


Whitepaper