Skip to main content
high Riskimpersonation

CEO Fraud (Business Email Compromise)

Scammers impersonate executives via email requesting urgent wire transfers, often using AI to craft convincing messages.

Last updated: January 5, 2025

What is this scam?

Business Email Compromise (BEC), also known as CEO fraud, involves scammers impersonating company executives or vendors to trick employees into making fraudulent wire transfers. AI makes this scam more dangerous by:

  • Generating perfectly written, personalized emails in the executive's style
  • Analyzing company communications to understand internal workflows
  • Creating convincing fake email addresses that closely mimic real ones
  • Even cloning executives' voices for phone calls

These scams target finance departments, accounts payable staff, and anyone with authority to transfer funds. The FBI estimates BEC scams cost businesses over $2.7 billion annually.

šŸ”How This Scam Works

  1. Reconnaissance: Scammers research company via LinkedIn, identifying CFO, CEO, and finance staff roles and relationships
  2. Email compromise or spoofing: Either hack executive's actual email account OR create lookalike domain (company.com vs comp4ny.com)
  3. Timing attack: Monitor exec calendars via social media/assistants; strike when CEO is traveling/unavailable
  4. AI-crafted email: Use AI to analyze past emails and mimic executive's writing style, tone, and signature
  5. Urgent wire transfer: Request immediate payment to "vendor" or "acquisition target," citing confidentiality
  6. Bypass controls: Instruct employee to skip normal approval process due to "time sensitivity"
  7. Money laundering: Funds transferred to attacker-controlled account, often overseas, immediately moved to hide trail

🚩Red Flags to Watch For

  • •Email requesting wire transfer comes unexpectedly or outside normal approval process
  • •Urgent tone with time pressure ("Need this done before end of business today")
  • •Request to bypass normal approval procedures
  • •Email address has subtle differences from real address (extra character, different domain)
  • •Email lacks normal signature or has formatting differences
  • •Sender refuses to discuss via phone or video call
  • •Instructions to keep request confidential
  • •Recipient is being asked to act outside their normal responsibilities
  • •Payment destination is unusual (new vendor, foreign account)
  • •Request references a "confidential acquisition" or "urgent legal matter"

šŸ›”ļøHow to Protect Yourself

  • 1Implement dual-approval process for all wire transfers above threshold
  • 2Verify any unusual financial request via phone call to known number (not one in email)
  • 3Never use reply button - manually type email addresses for sensitive communications
  • 4Hover over sender email address to verify exact spelling and domain
  • 5Establish verbal verification codes for high-value transfers
  • 6Train employees to question requests that bypass normal procedures
  • 7Use email authentication (SPF, DKIM, DMARC) to prevent spoofing
  • 8Limit public information about organizational structure and roles
  • 9Create a culture where employees feel comfortable questioning executives
  • 10Report suspicious emails to IT/security immediately, even if unsure

šŸ“žIf You've Been Targeted

  1. Stop all communication with scammer
  2. Report to relevant authorities
  3. Secure your accounts (change passwords)
  4. Monitor for identity theft
  5. Warn others in your network

šŸŒReport & Get Help

Report fraud and get support through these official resources in your country:

šŸ‡ŗšŸ‡øUnited States

šŸ‡¬šŸ‡§United Kingdom

Learn More

Related Scam Alerts

Share: