Business email compromise is one of the most financially devastating cybercrimes, causing more than $2.77 billion in losses in 2024 alone. Leveraging social engineering and text-based emails with no traditional indicators of compromise, cybercriminals evade legacy email security solutions and manipulate targets into divulging sensitive information or completing fraudulent financial requests.

Total losses attributable to BEC in 2024
BEC attacks Abnormal stops per year for each customer
Increase in BEC attacks between 2023 and 2024
Real-World Example of Business Email Compromise
A standard BEC attack has two common traits:

In this example, an attacker compromises a trusted vendor’s legitimate email account. They use the account to request all future invoices be paid to a different bank account, attaching a branded PDF with updated financial information. At first glance, the email comes from a legitimate sender, and it doesn’t have any malware or suspicious links. It can bypass a traditional email security solution and trick an unsuspecting recipient.
Source: BEC Attack Requests New Payment Methods for Outstanding Invoices in Attempted Payment Fraud

91% of security professionals reported experiencing AI-enabled cyberattacks in the past six months.
Generative AI enables scammers to craft unique email content quickly, making detection difficult for traditional security software.
AI simplifies the creation of sophisticated social engineering threats, empowering even novice cybercriminals to up-level their attacks.
Malicious AI tools are designed specifically for criminal activities, enabling attackers to convincingly compose deceptive content.