Most costly attack vector

Business Email Compromise (BEC)

The fraud that costs more than ransomware — and your email filter can't stop it.

$2.9B

Lost to BEC in the US in 2023 alone

Business Email Compromise is the leading cause of corporate financial fraud worldwide. It doesn't exploit software vulnerabilities. It exploits the trust your team places in a known email address — and no spam filter, DMARC record, or security awareness training has stopped it from growing year over year.

$2.9B
US BEC losses in 2023
FBI IC3 Annual Report 2023
21,489
BEC complaints filed in 2023
FBI IC3 Annual Report 2023
$137K
Average loss per incident
FBI IC3 2023
17%
Year-over-year increase in losses
FBI IC3 2023

A BEC attack begins with reconnaissance. The attacker identifies a target organization, maps its org chart (often from LinkedIn), and determines who has authority to approve financial transactions. They then either compromise the email account of a trusted executive or create a lookalike domain — acme-corp.com instead of acmecorp.com — that passes a casual visual inspection.

The attack is launched at a moment of maximum pressure: Friday afternoon before a long weekend, during an executive's documented travel, or immediately after a real acquisition announcement. The request is specific, urgent, and framed as routine. 'Wire $135K to close the vendor deal before Monday. CEO is unavailable. Handle this directly.'

Your CFO has wired money before. The urgency is plausible. The email address looks right. The wire goes out. By the time anyone questions it, the funds have moved through multiple international accounts and are functionally unrecoverable.

The FBI IC3 reports that BEC losses now exceed ransomware, data theft, and supply chain attacks combined. The average enterprise loses $137,000 per incident. Many lose far more — the largest single BEC loss reported to the IC3 in 2023 was $47 million.

What makes BEC uniquely dangerous is its simplicity: no malware, no zero-day exploit, no technical sophistication required. An attacker with a free email service, basic OSINT skills, and a plausible script can execute a successful BEC attack. The only defense that works is verifying identity out-of-band, before acting on the request.

Attack anatomy — step by step

  1. 1

    Attacker profiles the organization via LinkedIn, company website, and SEC filings to identify executive names, roles, and financial authority.

  2. 2

    Attacker registers a lookalike domain or compromises a legitimate email account via phishing or credential stuffing.

  3. 3

    Attack is timed for maximum urgency — Friday afternoon, executive travel, public announcement window.

  4. 4

    Targeted employee receives an email from what appears to be the CEO, CFO, or legal counsel with an urgent financial or credential request.

  5. 5

    Employee complies without verification. Wire is processed or credentials are shared.

  6. 6

    Funds move through layered international accounts within hours. Recovery rate is under 5%.

Why your stack fails

Email gateways, DMARC, SPF, and DKIM protect against unauthenticated email from known-bad domains. They cannot stop an attack from a compromised legitimate account, a lookalike domain that passes authentication, or a spoofed display name. Security awareness training reduces click rates on generic phishing — it does not neutralize a targeted, well-researched BEC request from what appears to be the CEO.

How Real Authenticator stops it

Real Authenticator adds a cryptographic out-of-band verification layer to any high-value request. Before a wire transfer is approved, the requestor proves their identity with a rotating TOTP code that only their enrolled device can generate. The request 'Send me your code' takes five seconds and cannot be faked — not by a compromised email account, not by a lookalike domain, and not by an AI-generated message.

Documented real-world cases

Puerto Rico government — $2.6M

In 2020, the Puerto Rico government transferred $2.6 million to a fraudulent account after an employee received a BEC email instructing a change to banking information for a government agency.

Source: AP / Puerto Rico Department of Justice, 2020

Toyota subsidiary — $37M

In 2019, a European subsidiary of Toyota was tricked into wiring €37 million to fraudsters in a BEC attack that exploited internal process knowledge and executive impersonation.

Source: Reuters, 2019

Ubiquiti Networks — $46.7M

In 2015, Ubiquiti lost $46.7 million in a BEC scheme where attackers impersonated employees and directed wire transfers to overseas accounts. $8.1 million was ultimately recovered.

Source: SEC Filing, 2015

Frequently asked questions

Does DMARC prevent BEC?

DMARC prevents spoofing from domains that have DMARC records configured — but does not protect against lookalike domains, compromised legitimate accounts, or display-name spoofing. The majority of BEC attacks today use these techniques specifically to bypass DMARC.

Can security training stop BEC?

Training reduces susceptibility to generic phishing. It is largely ineffective against targeted BEC, where the attack is personalized, uses known relationships, and is timed for moments of maximum cognitive load. The FBI notes that BEC losses have continued to grow despite widespread security training programs.

How does Real Authenticator integrate with our existing approval workflow?

Real Authenticator is channel-agnostic. Your team simply adds a code verification step to any high-value request — wire approvals, credential sharing, access provisioning. It takes five seconds and requires no integration with existing systems.

Sources & citations

Statistics reflect data available at time of publication. Real Authenticator is not affiliated with cited organizations. Links to external sources are provided for reference only.

Your team can't verify.
AI already knows it.

Every week you don't have a verification layer is a week an attacker can impersonate your CFO, your legal counsel, or your vendor — and someone on your team will trust them. Close the gap.

Reply within one business day
30-day pilot, no contract required
Zero-knowledge — nothing to breach
Talk to Our Enterprise Team

Custom pricing · Volume discounts · Annual contracts available