Key takeaways

Recognize BEC threats

Business email compromise (BEC) is a sophisticated phishing attack that targets individuals, businesses, and organizations – and can cost billions.

Identify warning signs

Pay attention to BEC “red flags,” such as changes to payment instructions, unexpected financial requests, or sense of urgency. Identifying an attempt can help you avoid becoming a victim.

Apply prevention practices

These six BEC prevention best practices can help keep you and your employees, vendors, and organization safe.

Cybercriminals have long exploited our reliance on email. Of the many types of cyberattacks aimed at email inboxes, organizations have been increasingly focused on business email compromise (BEC) – and for a good reason. BEC has rapidly become one of the most financially damaging and disruptive cybercrimes affecting businesses today.

BEC scams rely on impersonation, social engineering, and urgency to trick employees into sending money or sensitive information. What makes this threat so effective is BEC exploits human trust (not only technology), and these attacks can be difficult to spot and fast‑moving once they begin.

Knowing the warning signs and following prevention best practices can help keep your organization, your employees, and your customers safe.

What is BEC and how does it work?

BEC is a targeted form of phishing in which cybercriminals impersonate a trusted individual, such as an executive, vendor, or colleague, to request payments, credentials, or confidential data. A variety of techniques are used to make these messages as convincing as possible. Attackers often:

  • Spoof or compromise legitimate email accounts.
  • Mimic an organization’s tone, formatting, and communication style.
  • Insert themselves into real conversations or invoice processes.
  • Pressure recipients to act quickly or discreetly.

The goal might be a fraudulent wire transfer, an altered invoice, or a request to send funds to a new account. The fraudulent payments might be transferred several times between banks and accounts to quickly disperse funds before being caught. In some cases, fraudsters seek confidential information they can use in later scams.

BEC continues to escalate each year and has claimed more than $2 billion in annual losses in recent years, according to ongoing reporting from FBI’s Internet Crime Complaint Center (IC3).

Watch out for these BEC red flags

Because AI tools now help attackers create near‑perfect messages, not every BEC attempt will include obvious errors. It can also be difficult to detect because these messages could originate from a legitimate, trusted email account that has been compromised.

Trust your instincts. If something feels unusual, stop and verify using another communication channel, such as a known phone number. Look closer if you notice:

  • Changes to payment instructions, including new account numbers, updated routing numbers, or requests to send funds to an unfamiliar account. Always verify through a confirmed phone number before executing the change.
  • Invoices or payment amounts that don’t match prior agreements, lack clear justification, or arrive out of sequence.
  • Pressure to act quickly or keep the request confidential.
  • New or modified email addresses, altered “reply‑to” fields, or removal of other recipients in an existing email thread.
  • Tone, language, or grammar inconsistencies that don’t match the sender’s usual style.
  • Refusal to speak by phone or confirm details verbally when you request it.
  • Suspicious audio messages requesting payment changes that may be AI‑enhanced impersonation

BEC prevention best practices

In addition to watching out for those potential BEC indicators above – and training employees to be aware of them – these six best practices can help you protect yourself and your business from becoming victims of fraud.

1. Follow established business protocols

  • Use standard, documented procedures for approving and dispersing funds.
  • Never rely on contact information provided in an unexpected email.
  • Confirm payment changes or urgent requests through a known phone number or other trusted channel.

2. Monitor payment methods and changes

  • Use dual‑control or multi‑step verification for significant transactions.
  • Reduce reliance on paper checks; use secure electronic payment methods when possible.
  • Safeguard remotely deposited items and dispose of them properly once cleared.

3. Treat email and messages with healthy skepticism

  • Delete unsolicited emails from unknown senders.
  • Avoid using “reply” on suspicious messages; instead start a new email using the address on file.
  • Use company‑owned domains for employee email accounts.
  • Slow down if something feels unusual and ask a colleague for a second opinion.

Open Source Intelligence (OSINT) & the cyber threat of being profiled

In the wrong hands, public-facing data on businesses and employees can be used to launch personalized cyberattacks. Learn how threat actors do it and how to help protect against it.

4. Recognize and report phishing attempts

  • Be cautious of secrecy, pressure, or sudden changes in business practices.
  • Use digital signatures or secure communication tools for sensitive transactions.
  • Limit how much personal and organizational detail is shared publicly.
  • Report suspicious emails using your organization’s IT or cybersecurity process.

5. Strengthen your security controls

6. Act quickly if something goes wrong

  • Report promptly to the appropriate person or team in your organization and to your financial institution.
  • Rapid response can make a significant difference in recovering or blocking funds.

Stay vigilant and build a strong security culture

Cybercriminals continually adapt their methods, and BEC attacks remain a persistent threat for organizations of all sizes. Losses from cyberattacks are not always recovered, so strong processes, awareness, and preventative controls can greatly reduce your risk.

Featured insights with industry expertise

Tap into insights designed to help you navigate today’s decisions and tomorrow’s opportunities.

Business Cyber Resilience

Vendor vulnerabilities: Understanding third-party risk management

As businesses increasingly rely on third parties for essential services, strengthening vendor risk management practices has become critical to remaining resilient against cyber threats.

Business Cyber Resilience

Five password security best practices to defend your data

Passwords are your first line of defense against cybercriminals and data breaches. Strong password management practices can help keep your organization safe.

Scam & Fraud Protection

Six strategies to protect your business against account takeovers and scams

Brand impersonation and account takeovers are on the rise. These tactics can help organizations combat the threat and protect their brand identity.

Disclosure

The information provided in this document is intended solely for general informational purposes and is provided with the understanding that neither Huntington, its affiliates nor any other party is engaging in rendering financial, legal, technical or other professional advice or services, or endorsing any third-party product or service. Any use of this information should be done only in consultation with a qualified and licensed professional who can take into account all relevant factors and desired outcomes in the context of the facts surrounding your particular circumstances. The information in this document was developed with reasonable care and attention. However, it is possible that some of the information is incomplete, incorrect, or inapplicable to particular circumstances or conditions. NEITHER HUNTINGTON NOR ITS AFFILIATES SHALL HAVE LIABILITY FOR ANY DAMAGES, LOSSES, COSTS OR EXPENSES (DIRECT, CONSEQUENTIAL, SPECIAL, INDIRECT OR OTHERWISE) RESULTING FROM USING, RELYING ON OR ACTING UPON INFORMATION IN THIS DOCUMENT EVEN IF HUNTINGTON AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF OR FORESEEN THE POSSIBILITY OF SUCH DAMAGES, LOSSES, COSTS OR EXPENSES.

Third-party product, service and business names are trademarks/service marks of their respective owners.