Skip links

Anatomy of an Attack: Business Email Compromise

Business Email Compromise (BEC) is a form of email‑driven fraud where attackers impersonate someone trusted—an executive, colleague, or supplier—to trigger a payment or extract sensitive information. It rarely begins with obvious red flags. Instead, it starts with a message that looks routine, arrives at an inconvenient moment, and creates a sense of urgency.

For SMBs, the impact is often financial first and operational second. A single fraudulent transfer can disrupt cash flow, damage supplier relationships, and force leadership into a stressful investigation. Many organisations only realise their vulnerability afterwards, because the attack exploited process gaps rather than technical weaknesses.

This guide explains how BEC attacks unfold, why they work so consistently, and what practical steps reduce the risk.

How Business Email Compromise Works

BEC is essentially a confidence trick delivered through email. The attacker’s goal is to persuade a real person to take a risky action—most commonly:

  • Sending money

  • Changing bank details

  • Sharing sensitive information that enables further fraud

Attackers use a few common techniques:

  • Mailbox compromise: They gain access to a real email account and reply within genuine conversations, making their messages feel legitimate.

  • External impersonation: They use lookalike domains or display‑name spoofing, hoping the recipient won’t notice subtle differences.

  • Supplier fraud: They intercept legitimate invoice processes and send “updated bank details” at exactly the right moment.

BEC succeeds because it targets trust and routine. Attackers don’t need to break encryption or bypass firewalls if they can manipulate approval processes.

A Step‑by‑Step Breakdown of a Typical BEC Attack

Most BEC attacks are carefully prepared, not opportunistic.

1. Reconnaissance

Attackers gather information: who approves payments, which suppliers you use, and how your organisation communicates. Some of this is public; some comes from previous breaches or earlier phishing attempts. Their aim is to understand what “normal” looks like.

2. Access or Impersonation

They attempt to obtain email credentials or mimic a trusted sender. This is where multi‑factor authentication (MFA) matters. MFA makes it far harder to log in using stolen passwords alone. Attackers may also try to hijack existing sessions or create inbox rules that hide their activity.

3. Building Trust

With enough context, they craft messages that blend in. If they’re inside a mailbox, they copy tone and timing. If they’re impersonating externally, they rely on urgency and authority—phrases like “urgent,” “confidential,” or “I’m in a meeting” are designed to discourage verification.

4. The Trigger

They request something that moves money or control: a bank detail change, an urgent transfer, a payroll update, or sensitive documents. They want your process to default to speed, not scrutiny.

5. Covering Their Tracks

If they have mailbox access, they may delete emails, hide warnings, or leave forwarding rules in place to repeat the attack. By the time the fraud is spotted, the payment has often already left the account.

Understanding this sequence makes it clear why BEC is so effective—even in organisations that consider themselves careful.

Why BEC Works So Well

BEC succeeds because it exploits normal business behaviour.

  • Email is central to SMB operations. It’s where approvals happen and supplier relationships are managed. Attackers mimic this routine.

  • Responsibility is split across departments. Finance expects IT to block fraudulent emails; IT expects finance to spot suspicious payments.

  • Leadership language can unintentionally increase risk. Urgent or confidential requests are easy for attackers to imitate.

  • It pressures people. Staff worry about delaying legitimate requests or appearing difficult. Attackers rely on that discomfort.

This is why BEC defence requires both technical controls and clear, organisation‑wide processes.

How SMBs Can Reduce Their Risk

The strongest protection combines payment controls with email security controls.

Strengthen Your Processes

Email alone should never be enough to change where money goes.

  • Verify bank detail changes using a second channel—call a known number from your records, not one provided in the email.

  • Use dual approval for high‑risk actions, especially payee changes and urgent transfers.

  • Make verification a standard step, not a personal judgement call. This helps staff act confidently under pressure.

Strengthen Your Technical Controls

Protect the accounts that matter most.

  • Enable MFA for leadership, finance, and anyone who can authorise payments.

  • Use conditional access to require extra verification for risky sign‑ins (unusual locations, unfamiliar devices, impossible travel).

  • Monitor for suspicious mailbox activity such as unexpected forwarding rules or unusual sign‑ins.

  • Implement DMARC to reduce domain spoofing and prevent attackers from sending emails that appear to come from your organisation.

Strengthen Your Training

Generic phishing training isn’t enough. BEC training should focus on real‑world scenarios your teams face:

  • Supplier bank detail changes

  • Urgent executive requests

  • End‑of‑month payment pressure

The goal isn’t to make staff suspicious of everything—it’s to help them recognise manipulation patterns and follow verification steps without hesitation.

How We Can Help

As an MSP, we help reduce the likelihood and impact of BEC by combining practical process improvements with strong technical protections.

We can:

  • Review your payment approval and supplier‑change processes

  • Identify where email is being trusted too much

  • Introduce verification steps that fit your real workflows

  • Support MFA rollout and conditional access configuration

  • Implement DMARC and other email authentication controls

  • Monitor for suspicious sign‑ins and mailbox rule changes

If you want to understand where your organisation is most exposed—and which changes will reduce risk quickly without disrupting day‑to‑day operations—get in touch. We’ll help you put a focused, effective plan in place.