The anatomy of BEC: What to look out for
The FBI dropped a bombshell: BEC attacks cost companies over $43 billion globally between 2016 and 2022. Yeah, you read that right… billion. These aren’t just stats on a spreadsheet. These represent real businesses getting blindsided by a single email. Let’s talk about the telltale signs that could save you from becoming a victim.
Suspicious sender behavior
First rule of thumb: don’t trust just the name in the “From” field. BEC attackers are experts in domain spoofing, so they’ll make the email look like it’s from a legit source. Here’s what to look for:
-
Domain tweaks: Attackers might change a single character in a domain. Think “bank.com” versus “b8nk.com.”
-
Display name tricks: You might see "CEO Janet Smith" pop up, but when you check the email address, it’s off by a mile.
-
Reply-to changes: If you hit “reply” and the response goes to some strange email address, you might be walking into a trap.
-
Fresh domains: If a domain was registered in the last 30 days, raise an eyebrow.
Watch an episode of our Tradecraft Tuesday where Huntress Security Research expert Matt Kiely demonstrates several methods of gaining access to an M365 identity.
Timing and contextual red flags
Business email compromise detection isn’t a high-tech magic trick. These scammers don’t just wing it. They strike when you’re most vulnerable. That’s why timing and context matter big time. Watch for these red flags:
-
Urgent requests: “Act now! Wire transfer must be made immediately!” If an email is pushing you to do something in a hurry, slow down.
-
CEO authority: If the email says “the CEO needs this right now” or “I’m unavailable by phone,” be suspicious. It’s a classic trick.
-
Off-hours chaos: Getting emails at 2 AM asking for large sums of money? That’s a red flag.
-
Breaking standard procedures: If the process to approve payments or changes gets bypassed, don’t just approve. Double-check.
Linguistic and stylistic warning signs
If you want to detect BEC attacks, you’ve got to think like a con artist and read between the lines. These scams don’t always scream “fraud” at first glance. Sometimes, the giveaway is buried in the tone, the grammar, or a weird word choice that just doesn’t sit right. Keep your eyes peeled for:
-
Grammatical errors: Your CEO wouldn’t send an email that had typos, spelling errors, or weird phrasing.
-
Tone shifts: If the way someone writes changes suddenly, that’s not normal.
-
Overuse of authority: Excessive language like “This is urgent!” or “Don’t tell anyone about this” is a hallmark of BEC attacks.
- Cultural misalignment: If the phrasing doesn’t match the sender’s typical style, it’s worth investigating.