WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – The Anatomy of BEC Attacks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – The Anatomy of BEC Attacks

Author: Alec Davison

Created: Thursday, July 14, 2022 - 19:29

Categories: Cybersecurity

A new report from the cybersecurity firm Cofense examines the tactics and trends of one of the costliest cyber threats for companies both large and small – Business Email Compromise (BEC) scams. Unlike other email-based phishing attacks which utilize malware and stolen credentials, BEC scams involve social engineering tactics, via email communications, to trick an employee of a company to transfer unauthorized funds to the threat actor.

As part of the investigation, Cofense researchers engaged with the scammers by responding to their fraudulent emails to better understand how the attack chain works. Some of the key findings of the report include:

  • Payroll diversion and gift card scams as the most common form of BEC messages.
  • BEC emails typically use language meant to illicit a sense of urgency or to ingratiate the victim to the adversary.
  • BEC scams are more often than not sent from free webmail services, with Gmail representing the majority.
  • Most BEC threat actors wait for at least the first reply from their victim before making their fraudulent request. In fact, 89 percent of BEC scammers made a fraudulent request after the Cofense researcher’s first response.
  • Victims commonly fall for BEC scams more easily than other phishing emails because in BEC actors exploit relationships that already exist.

Mitigation practices to defend against this activity include many of the same steps for defending against any email-based attack. However, two practices are very important, frequent employee cybersecurity awareness training and clearly-defined procedures for authenticating financial requests. Access the full report at Cofense.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar