Business email compromise 2017-07-28T05:39:15+00:00

What is business email compromise (BEC)?

A business email compromise is a spear phishing attack aimed at a controller, accountant, or book-keeper aimed at convincing them to send funds for a bogus business transaction. It’s a specific variant of spear phishing.

Business email compromise

What is the difference between Phishing and Spear Phishing Attacks?

Phishing attacks attempt to gather information from many people by sending out generic emails containing malware attachments or emails with generic scams. These types of attacks are easier to defend against with standard signature-based email filtering systems. In contrast, spear phishing attacks, like whaling, are targeted at specific individuals and customized to be convincing. These attacks are harder to defend against, because they look like regular emails to standard email security systems. Specialized protection is required to defend against these customized attacks.

Phishing attack

Phishing attack

Spear Phishing Attack

Spear Phishing attack

Other types of spear phishing attacks include:

CEO Fraud: This is a spear phishing attack in which emails supposedly coming from the CEO are asking for funds to be immediately transferred to fake accounts for vendor payment or a purported merger.

Whaling: Whaling is a spear phishing attack aimed at an especially valuable target such as a CEO, important political figure, or extremely high value security credentials.

Spear Phishing is, by far, the most dangerous attack vector against your network.

How to protect from BEC?

Vade Secure’s anti-spoofing feature, Identity Match, combines a technical analysis and a content and style analysis of each email to ensure that every sender is who they say they are. Any links or attachments are individually quarantined and examined to ensure that they are safe. What’s more, our system alerts users with a special banner whenever someone is requesting suspicious or confidential information.

“Vendors that specialize in content inspection will be more successful in detecting these types of attacks than those that rely on reputation.”

Gartner recomendation