Skip to main content
    GevorderdLes 6 van 9·Phishing & social-engineering e-mail

    Business Email Compromise (BEC) — How to Stop the $50bn Wire-Fraud Pattern in 2026

    Business email compromise is a wire-fraud attack where an impersonator — posing as a CEO, CFO, supplier, or M&A counterparty — convinces a finance team to redirect a legitimate payment. The 2026 variant uses prior-mailbox-compromise context plus deepfake voice and routinely defeats organisations that rely on email-only confirmation.

    Reviewed by the HackersHub team — updated 13 May 202610 min readVrij te gebruiken — CC-BY-ND 4.0

    Het scenario

    A mid-market Dutch construction firm is closing on a €4.2M property purchase. Two weeks before completion, the AP clerk receives an email from the seller's solicitor — the actual solicitor's correct email address. The message says the firm's client account is being audited and asks for the funds to be wired to the solicitor's personal account 'in escrow'. The signature, footer, and prior correspondence references all match. The AP clerk forwards it to the partner for approval. The partner approves. €4.2M leaves. Forty-eight hours later the seller calls asking when the wire is arriving — the solicitor's mailbox had been compromised three months earlier through a forgotten OAuth grant. The funds had already moved through five mule accounts in Hong Kong and Turkey. Less than €110k was recovered. The fraud was reported to FBI IC3, the Dutch police, and the solicitor's PI insurer; the loss was uninsured under the construction firm's cyber policy because no malware crossed their network and no employee was 'phished' in the classical sense. The legitimate sender was the attack vector.

    Hoe de aanval werkt

    Modern BEC is not a single email — it is a campaign that often runs for weeks. The most common variants in 2026 are CEO/CFO impersonation, supplier impersonation (also called vendor email compromise or VEC), and M&A-deal-redirect. Each follows the same arc: the attacker gains read-only access to a relevant mailbox (often via OAuth consent phishing or credential stuffing), spends days mapping ongoing transactions, then steps in at the precise moment a wire instruction is exchanged. In VEC the attacker uses the legitimate supplier's mailbox to send a 'banking details have changed' notice timed exactly to a real invoice. In CEO fraud the attacker spoofs (or compromises) the CEO's account and asks an executive assistant to push through an unbudgeted payment 'for the deal I cannot talk about yet'. In M&A-redirect the attacker monitors counsel mailboxes and intervenes the week of closing. MITRE ATT&CK techniques: T1656 (Impersonation), T1114.002 (Email Collection: Remote Email Collection), T1078.004 (Valid Accounts: Cloud Accounts), T1539 (Steal Web Session Cookie). The technical defence is identity-and-mailbox hardening; the operational defence is process — specifically a two-person rule on payment-instruction changes that cannot be bypassed by any single email, regardless of how legitimate it appears.

    Waar je op moet letten

    • Any email instructing a change to banking details, IBAN, BIC, account name, or beneficiary — regardless of how trustworthy the sender appears
    • Pressure to complete a payment before a specific time, often framed as compliance, audit, regulatory deadline, or executive travel
    • A request to use a new contact method introduced inside the message ('please call me on this new number')
    • Slight changes in the sender's email style — different greeting, removed signature block, different language formality
    • Auto-forwarding or auto-reply rules you did not create appearing in your mailbox — a hallmark of attacker mailbox occupation
    • Sudden 'I am stuck in airport, please handle this for me' messages from executives, especially when they are travelling
    • An invoice with the right reference number but a payment instruction that contradicts the contract or the supplier's normal banking details
    • A 'reply-all' that has been narrowed to just one recipient — attackers often peel a single victim away from the wider thread

    Wat te doen

    1. Treat every payment-detail change as guilty until verified — every time, no exceptionsEven if it has 'happened before with this supplier'. Attackers wait for the moment you stop verifying.
    2. Call the requester on a number from your verified contact records — not the messageUse the number from the contract, your CRM, or a prior verified email. Never use a number provided in the suspicious message.
    3. Require a two-person authorisation on any payment-instruction change above your defined thresholdTwo real humans, on two channels. One person signing both sides defeats the control.
    4. If the message is from an internal executive, verify in person or via Teams/Slack call on their known account — not just emailDeepfake voice is cheap in 2026. Video is harder to fake live; in-person is hardest.
    5. If money has moved, call the bank within the first hour to attempt a recallMany wire frauds can be partially or fully recalled if the receiving bank is notified within the first day. Escalate simultaneously to finance leadership and security.
    6. Report to FBI IC3 (US) / Politie / NCSC-NL / local fraud authorityAuthorities have international rails for clawback that you do not. Reporting is free and improves recovery odds.
    7. Preserve all email headers, message IDs, attached files, and timestampsDo not delete and do not 'clean up'. Move the messages to a Quarantine folder and let your security team pull the full forensic record.

    Verdediging — voor IT en beleid

    Technische controles

    • Enforce DMARC p=reject on all sending domains, with BIMI for the brand-verified inbox UX — drastically reduces external spoofing
    • Conditional Access policies in Microsoft 365 / Google Workspace that require phishing-resistant MFA (FIDO2 / passkeys) for any session from new countries or new IPs
    • Mailbox auditing turned on at maximum verbosity, with alerts on: new auto-forwarding rules, new inbox rules with 'delete' actions, new OAuth consent grants, sign-ins from anonymous-proxy infrastructure
    • Anti-impersonation policies on the mail gateway that flag display-name impersonation of executives even when domain is external
    • Outbound DLP rules that warn or block when banking-detail-shaped data is being mailed externally for the first time
    • External-sender banners — yes, even on first-party-tenanted M365 — to slow down 'auto-trust' on internal-looking messages
    • Periodic OAuth consent review on every cloud tenant and revocation of any third-party app that no one in finance, HR or IT recognises

    Beleidscontroles

    • Two-person rule, in writing, on every payment-instruction change above threshold — and a stricter rule on any first payment to a new vendor
    • A single canonical channel for vendor banking details (a portal, a contract, a CRM field) — banking details are NEVER updated based on email content alone
    • An explicit 'no-blame, fastest path to security' reporting culture — measured by reporting rate, not click rate
    • Quarterly tabletop exercise that walks finance + executives through a simulated BEC, including the 'money has already moved' branch
    • Documented incident-response playbook with the specific phone numbers of: the bank's fraud line, the firm's cyber insurer, local police cybercrime unit, FBI IC3 (if any US connection)

    Trainingsfrequentie

    BEC is the single highest-financial-impact cyber attack pattern in 2026. Awareness training alone is insufficient — pair this module with quarterly simulated BEC campaigns directly targeting finance, AP, executives and EAs, and an annual tabletop exercise where the 'wire is already gone' branch is rehearsed. Measure reporting rate as your primary metric, not click rate.

    Korte check

    Vijf vragen. Antwoorden en toelichting verschijnen na inzenden.

    1. Q1.

      A long-standing supplier emails you that their banking details have changed and attaches a new invoice with a new IBAN. Their email signature, prior threads and tone are identical to before. What is your correct first action?

    2. Q2.

      Which control most directly reduces the financial exposure of BEC, regardless of mailbox compromise?

    3. Q3.

      Money has been wired in response to a BEC. What is the most time-critical action?

    4. Q4.

      You notice a new mailbox rule in your account that auto-forwards external email to an unfamiliar address and marks it as read. Most likely cause?

    5. Q5.

      Which factor most strongly distinguishes BEC from generic phishing?

    Bronnen & verdere lectuur

    Verwante modules

    Wil je een echte aanvaller in je omgeving testen?

    HackersHub voert betaalde red-team-engagements uit.

    Praat met een expert

    Deze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.