Determine And — Investigate Service Email Compromise (bec) Scams
: Requests that deviate from standard business procedures, such as a CEO asking an assistant to buy gift cards, are common lures. Investigating a Suspected Incident
If a BEC attack is suspected, investigators follow a technical workflow to determine the scope: Business Email Compromise - FBI : Requests that deviate from standard business procedures,
Detecting a BEC attempt requires looking for psychological and technical anomalies: Because these emails typically contain only text and
: Scams often use high-pressure language (e.g., "urgent," "strictly confidential") to force quick action without verification. : Requests that deviate from standard business procedures,
Business Email Compromise (BEC) is a sophisticated social engineering scam where attackers impersonate a trusted source—such as a CEO, vendor, or attorney—to trick employees into transferring money or sensitive data. Because these emails typically contain only text and avoid malicious links or attachments, they often bypass standard security filters. Determining a BEC Scam (Red Flags)