Business email compromise (BEC) is a type of targeted social engineering attack that relies heavily on pretexting. 25% of all BEC attacks now begin with pretexting.
In BEC, the character is a real-life company executive or high-level business associate with authority or influence over the target. Because the scammer pretends to be someone in a position of power, many targets will simply comply.
The situation is the character’s need for help with an (almost always) urgent task. For example, “I’m stuck in an airport and forgot my password to the payment system. Can you please remind me?" Or “Can you wire USD XXX,XXX to bank account #YYYYY to pay the attached invoice? Quickly, before they cancel our service.”
By impersonating a boss through texts, emails, phone calls and even AI-generated videos, scammers can often fool employees into exposing sensitive information or even committing crimes.
In one famous case, a prerecorded (and AI-generated) web conference ended with instructions by the fake senior leadership that convinced an employee to transfer HKD 200 million to the attackers.4
Year after year, BEC ranks among the costliest cybercrimes and social engineering techniques. According to the IBM® Cost of a Data Breach Report, data breaches caused by BEC cost victim organizations an average of USD 4.88 million.
According to data from the FBI’s Internet Crime Complaint Center, BEC resulted in total losses of nearly USD 2.9 billion for victims in 2023.3