20 August 2025 · 6 min read
Business email compromise (BEC) is consistently ranked among the most costly categories of cybercrime globally — not because the technical attacks are sophisticated, but because they are effective. The typical BEC attack doesn't involve malware or zero-day vulnerabilities. It involves a convincing email, a moment of inattention, and an action that seems routine. Understanding what these attacks look like is the first step to not falling for them.
Supplier impersonation: an attacker monitors email communication between your company and a regular supplier. At the right moment — often just before a large payment is due — they send an email that appears to come from the supplier, informing you that the supplier's bank details have changed and providing new account details. The email looks legitimate. The timing is right. The payment goes to the attacker's account. By the time the genuine supplier follows up about the missing payment, the money is gone.
CEO or director impersonation: an employee in the finance team receives an email apparently from the managing director or CEO, asking for an urgent funds transfer. The email explains that a confidential acquisition is underway and the transfer must be done immediately and quietly. The urgency and the apparent seniority of the sender override the employee's usual caution. The transfer is made.
IT support impersonation: an employee receives an email claiming to be from IT support, asking them to verify their credentials or click a link to reset their password before their account is locked. The link leads to a convincing login page that captures their username and password. The attacker now has valid credentials for your email system and can send emails from a real account.
Invoice fraud: a fraudulent invoice is submitted by email, often in a format that closely resembles invoices from real suppliers. Sometimes this involves a compromised supplier account sending invoices from a legitimate address. Without a verification process, the invoice gets processed and paid.
Package or delivery scams: less targeted but common — emails claiming a delivery has failed and requesting payment of a small customs or redelivery fee. The fee is small enough that recipients don't scrutinise it carefully. These are credential harvesting attacks dressed as routine transactions.
These attacks succeed because they are engineered around human behaviour rather than technical vulnerabilities. They create urgency ("the payment must be made today"). They invoke authority ("the MD needs this done now"). They arrive at plausible times and fit into existing workflows. They look like the emails you already receive.
Attackers research their targets before launching. They may study your website to learn who your key suppliers are, read LinkedIn to understand your organisational structure, or monitor publicly available information to time their approach around known events. A press release about a new partnership, a company announcement about growth, a listed job opening for a finance role — all provide information that makes impersonation more convincing.
Some attacks can be blocked before they reach your inbox:
Technology alone is insufficient. Process controls address the human element:
The most effective defence is a team that recognises these attacks. Regular training doesn't need to be elaborate — a brief monthly discussion of a real-world BEC example is more effective than an annual compliance video that people click through without reading.
Teach your team to look for:
If you suspect you have received a BEC attempt, report it internally immediately. If a payment has been made to a fraudulent account, contact your bank the same day — international fraud transfers can sometimes be recalled if reported quickly. File a report with the cybercrime portal at cybercrime.gov.in. Change passwords for any accounts that may have been accessed. Alert your IT provider or managed services partner so they can check for signs of further compromise.
Most importantly: don't assume that because your business is small or not high-profile, you won't be targeted. BEC attacks are largely automated and opportunistic. Any business that sends or receives significant payments by email is a target.