Site icon SEPA for Corporates

CEO Fraud or Business Email Compromise EXPLAINED!

CEO Fraud or Business Email Compromise (BEC) has been widely reported with several recent high profile incidents. It is a global threat to corporates, large and small, and is on the face of it a simple and highly effective way of ‘attacking’ an ill prepared and uninformed company. Before you say, that can never happen at my company take a read of the Krebs on Security review of various swindles including a $46 million loss at networking firm, Ubiquiti. The FBI reports that victims of CEO fraud or Business Email Compromise have increased by 270% since the start of 2015, with cases in almost 80 countries around the world. In short, this is a big problem.

In this post, I will provide an overview of how the CEO fraud or business email compromise scam works.

How does the CEO Fraud Email work?

Ok, suppose you are an accountant, part of the treasury team or senior member of the accounts payable team who frequently deals with senior management (CEO, managing director) to handle sensitive and / or urgent payments. You receive an email from senior management in a familiar format using familiar language asking you to make an urgent wire payment stating the bank account details.

The details of the payment (amount, bank details) would typically be on a letter bearing the company logo, and a signature from either the CEO or someone from senior management. Alternatively the email may reference unpaid supplier invoice(s) and ask for immediate payment.

The problem, obviously, is that the email is not from the CEO or senior management – it is from fraudsters targeting your company.

Key CEO Fraud Email Details:

Don’t be a CEO Fraud Mail Victim:

As simple as it is, the CEO fraud email scam is serious. So much so that the FBI is calling business email compromise “an emerging global threat“.

Exit mobile version