In This Article
Business Email Compromise (BEC) is the most financially damaging cyber threat category — $50 billion in adjusted losses across 277,918 incidents documented by the FBI through 2023, with 2024 and 2025 showing continued growth. Unlike phishing's broad nets, BEC attacks are surgical: they impersonate known trusted parties in your organization to manipulate specific people into transferring money or disclosing sensitive data.
| BEC Type | Attack vector | Technical defense | Detection signal |
|---|---|---|---|
| CEO fraud | Spoofed From: header or lookalike domain | DMARC p=reject + display name monitoring | Reply-To differs from From: domain |
| Vendor impersonation | Compromised or lookalike vendor email | SPF/DKIM verification + DMARC | Sending IP not in vendor SPF record |
| Account takeover | Credential phishing + inbox rule creation | MFA + conditional access policy | Login from new IP or unusual time |
| Payroll diversion | HR system access + bank detail change | Change approval workflow + 2FA | Direct deposit change without manager approval |
| Invoice fraud | Forged invoices from lookalike domain | Email gateway + lookalike domain monitoring | Domain registered < 30 days |
The defining characteristic that makes BEC so dangerous: it doesn't rely on malware, malicious links, or obvious spam indicators that email security tools are trained to catch. A BEC message is often indistinguishable from legitimate email — it's written in the correct style for the person it impersonates, references real business context, and asks for something plausible. Technical defenses matter enormously for preventing the spoofed-domain variant, but procedural controls are equally critical for the account-compromise variant.
The Four BEC Attack Patterns
1. CEO/Executive Fraud (Direct Spoofing)
Attacker sends email appearing to be from the CEO or another executive, requesting urgent wire transfer, gift card purchase, or sensitive document. Display name shows the executive's name; actual From address is a spoofed domain or lookalike. Often includes urgency ("I'm in a meeting, process this immediately") and confidentiality instructions ("don't involve anyone else").
Technical defense: DMARC at p=reject on your primary domain prevents spoofing of your exact domain. But display-name spoofing (correct name, wrong domain) passes DMARC — it requires email gateway rules that flag messages where the display name matches an internal executive but the sender domain is external.
2. Vendor Invoice Fraud
Attacker impersonates a known supplier, submitting a plausible invoice with updated payment details (routing number/account changed). Often intercepts email threads (from a compromised account) so the fake invoice arrives as a reply to an existing legitimate conversation.
The only reliable defense here is procedural: independent verification of payment destination changes via a known-good phone number or in-person confirmation. No technical email control stops a well-crafted invoice that arrives from a legitimately compromised account.
3. Account Takeover (Compromised Legitimate Account)
Attacker obtains credentials for a legitimate email account (phishing, credential stuffing, password reuse) and uses it to send BEC messages from inside the organization. These messages pass all authentication checks because they originate from the real account.
Prevention: MFA on all email accounts, conditional access policies, anomalous sign-in detection. An account with MFA is dramatically harder to take over — even with valid credentials, the attacker still needs the second factor. The FBI IC3 data shows credential theft is the primary initial access vector for account-takeover BEC.
4. Lookalike Domain Attacks
Attacker registers a domain visually similar to yours (acme-corp.com instead of acmecorp.com, acm3corp.com, acmecorps.com) and sends messages from it. SPF, DKIM, and DMARC all pass — on the malicious lookalike domain, not your domain.
Technical defense: DMARC on your domain doesn't help here (it's a different domain). Domain similarity detection tools monitor registrations of lookalike domains and alert you when similar domains appear. Some email security gateways include lookalike domain detection in their inbound filtering.
Technical Defenses: What Actually Stops What
Understanding which attack variants each technical control addresses prevents over-reliance on any single defense:
| Attack Type | DMARC p=reject | MFA | Email Gateway Rules | Procedural Verification |
|---|---|---|---|---|
| CEO fraud (domain spoofing) | ✅ Blocks exact domain spoofing | No | Partial (display name rules) | Backup |
| CEO fraud (display name) | ❌ Doesn't stop display-name attacks | No | ✅ Flag external + exec name | ✅ Required |
| Vendor invoice fraud | Partial (if vendor is spoofed) | No | Partial (flag payment keywords) | ✅ Essential |
| Account takeover | ❌ Auth passes (real account) | ✅ Prevents takeover | ✅ Anomaly detection | ✅ Required |
| Lookalike domain | ❌ Different domain | No | ✅ Similarity detection | ✅ Required |
The table reveals why DMARC enforcement is necessary but not sufficient. DMARC at p=reject is the most effective single technical control for exact-domain spoofing — it eliminates one of the primary BEC entry vectors. But it provides no protection against account takeover attacks or lookalike domains. A comprehensive BEC defense requires technical controls at multiple layers plus procedural controls for the scenarios that technical measures can't address.
DMARC Enforcement as BEC Prevention
DMARC at p=reject tells receiving servers to reject messages claiming your domain that fail authentication. This directly prevents attackers from sending spoofed email to your customers or business partners claiming to be from yourdomain.com. It also protects your employees from receiving spoofed email that appears to come from your own domain.
As of 2025, only 7.6% of domains enforce DMARC with p=reject. The remaining 92.4% of domains are vulnerable to exact-domain spoofing — anyone can send email claiming to be from those domains, and most recipients' email servers have no mechanism to reject it. Domains with DMARC at p=reject are 2.7× more likely to achieve inbox placement and are immune to exact-domain spoofing attacks.
The implementation path: Start at p=none (monitoring), collect aggregate reports (rua=) to identify all legitimate sending sources, configure authentication for each source, verify 100% of your legitimate mail authenticates, then progress to p=quarantine and finally p=reject. This staged approach typically takes 6–12 weeks for organizations with complex email environments. Rushing to p=reject without completing source discovery risks blocking legitimate mail.
Email Gateway Rules for BEC Detection
Configure these rules in your email security gateway (Microsoft Defender for Office 365, Proofpoint, Mimecast, Google Workspace Admin, or similar):
External sender warning: Append a banner to all inbound email from external senders: "This email was sent from outside your organization." Simple and effective at making spoofed messages visible. Users learn to expect this banner on external email and notice its absence on spoofed internal-appearing messages.
Executive impersonation detection: Flag messages where the display name matches an internal executive but the sender domain is external. This catches the display-name spoofing variant that DMARC doesn't address. Many email security platforms include this as a built-in anti-BEC rule.
Reply-to mismatch alert: BEC messages often set a reply-to address different from the sender address — the From appears to be the CEO but replies go to the attacker's mailbox. Flag or quarantine messages where Reply-To domain differs from From domain.
High-risk keyword routing: Route messages containing payment-related keywords (wire transfer, invoice, routing number, direct deposit change, gift card) from external senders through additional approval or alerting workflow.
Procedural Controls: The Last Line
Technical controls fail against account-compromise BEC and sophisticated lookalike attacks. Procedural controls are the defense layer that doesn't fail these variants:
Two-step payment verification: Any financial transaction initiated via email must be confirmed through a separate communication channel (phone call to a known-good number, video call, or in-person). This single control stops the majority of BEC wire transfer fraud. The friction it introduces is specifically targeting attacks — legitimate business partners and colleagues accept and expect this process.
Payment destination change verification: Any request to change payment routing or banking details — regardless of how legitimate the email appears — triggers mandatory voice verification to a previously confirmed number. This stops vendor invoice fraud even when the attacker has access to a legitimate compromised account.
Out-of-band confirmation for sensitive requests: Train employees that any request for unusual action (unusual payment, sensitive data transfer, credential sharing) from a person they know should be confirmed via a separate channel before acting — even if the email seems completely legitimate and comes from a known contact.
Dedicated Email Infrastructure That Works
Stop fighting deliverability issues from shared infrastructure. Our dedicated IP environments come with managed warm-up, blacklist monitoring, and postmaster support — so your email reaches the inbox.
Explore Infrastructure PlansLast updated: April 8, 2026

