Critical Threat Level
Executive impersonation attacks designed to trick employees into authorizing fraudulent wire transfers
Business Email Compromise (BEC), commonly called CEO fraud, is a sophisticated phishing attack where criminals impersonate company executives (CEO, CFO, or other C-level) to trick employees—typically in accounting or finance—into authorizing fraudulent wire transfers or revealing sensitive information.
Unlike mass phishing campaigns, BEC attacks are highly targeted and personalized. Attackers research the company's organizational structure, executive names, communication patterns, and business relationships before launching the attack.
Why It's So Effective:
Attackers gather intelligence about the target company:
Attackers use one of two methods:
The attacker sends a carefully crafted email with:
If the employee complies:
Attackers impersonated company executives and outside attorneys through email, convincing the finance department to wire $46.7 million to overseas accounts controlled by criminals. The company only recovered $8 million.
The Email Content:
From: "CFO Name" <cfo@ubiquiti-networks.com>
Subject: Urgent: Confidential Acquisition - Wire Transfer Required
"I'm in meetings with our legal team regarding the acquisition we discussed. I need you to process the following wire transfer immediately. This is time-sensitive and highly confidential. Our outside counsel will send wiring instructions shortly. Please coordinate directly with them and do not discuss this with anyone else on the team yet."
Red Flags: Urgency, confidentiality demand, external coordination, pressure to bypass verification
HeaderScope can help detect CEO fraud attempts by revealing authentication failures and routing anomalies:
Authentication-Results: spf=fail (sender IP is not authorized)
Authentication-Results: dkim=none (no signature found)
From: "John Smith, CEO" <john.smith@company-name.net>
Reply-To: payments@protonmail.com
Received: from smtp.gmail.com (not company mail server)
If your CEO's email normally has valid SPF/DKIM and originates from company mail servers, these failures are immediate red flags.
Require verification through a separate communication channel for ANY financial request:
Act immediately - every minute counts:
Recovery Rate: Only 10-15% of BEC losses are recovered. Speed is critical.
When you receive an unexpected financial request from an executive, use HeaderScope to check the email headers before taking action: