SHARE
Facebook X Pinterest WhatsApp

Scammers Go Phishing: Business Email Compromise on the Rise

Spammers are increasingly relying on high-targeted messages for financial gain, tricking businesses into either transferring funds or releasing sensitive information on employees. Since the beginning of the year, Cloudmark has seen a dramatic increase in text-only, email impersonation attacks known as Business Email Compromise (BEC). The volume of BEC prompted the FBI to issue an […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jun 29, 2016

Spammers are increasingly relying on high-targeted messages for financial gain, tricking businesses into either transferring funds or releasing sensitive information on employees. Since the beginning of the year, Cloudmark has seen a dramatic increase in text-only, email impersonation attacks known as Business Email Compromise (BEC).

The volume of BEC prompted the FBI to issue an alert on CEO spoofing spams cautioning businesses to be wary of e-mail only wire-transfer requests and requests involving urgency. According to Cloudmark’s latest Quarterly Threat Report, losses from BEC wire-fraud attacks rose to an average of $104 million per month over the last 15 months.

Another BEC attack that gained traction this year is the W-2 scam, with more than 60 organizations falling prey to attacks targeting their employees’ W-2s. Large and small companies in industries ranging from health care to higher education to technology to manufacturing have been fooled by attackers into leaking their employees’ tax forms, with some attacks exposing the confidential information of tens of thousands of people.

How these attacks typically happen is that a member of the finance or human relations team will receive an email that appears to be from a high-ranking official, usually the CEO or CFO – with a straightforward request such as funds of W-2 data. However, they are really sending the funds or sensitive data to an outside official not connected with their organization. Due to the simplicity in executing these attacks, BEC spoofing attacks are one of the fastest growing forms of cyber fraud.

In this slideshow, Cloudmark has compiled tips for businesses and individuals on how to combat phishing attacks and prevent identity and tax fraud as financial losses.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 1

Best Practices for Detecting and Avoiding Scams

Click through for tips business and individuals can use to combat phishing attacks and avoid scams, as identified by Cloudmark.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 2

Implement Email Threat Intelligence

Implement email threat intelligence to help identify attack employees most at risk.

Threat intelligence about spam and phishing, such as domains and IP addresses associated with attacks, helps to detect and deflect many spearphishing campaigns. It can also help organizations to identify individuals more likely to be targeted by scammers based on their role or the number of threats they experience. Armed with this information, organizations can help raise awareness by providing education and support to users who are most at risk.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 3

Confirm Requests

Always confirm sensitive information requests.

If an employee receives an email from the CEO or supervisor asking them to send sensitive information like W-2s or to wire funds, they should speak directly with that individual to confirm the request, either in person or by phone. The “human factor” can be surprisingly effective in detecting threats.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 4

Use Context Analysis and Behavior Learning

Use context analysis and behavioral learning to detect unique but anomalous spearphishing emails.

Context analysis and behavioral learning can help identify emails that deviate from normal email paths and typical behaviors for a specific company, or for specific groups within that organization. By observing email traffic for a period of time, an intelligent spearphishing protection solution can create virtual maps of normal email sources and paths for the organization.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 5

Focus on Content

Pay close attention to the content of the email.

Signs such as misspelled words or grammatical errors may be a signal that an email is not legitimate. Another warning sign is if the sender’s email address does not match the email address format of the organization to which they claim to belong.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 6

Notify Appropriate Agencies

Notify the appropriate government agencies if you’ve been victimized.

Tax and identity fraud victims should file a 14039 form with the IRS and request an IP PIN from the government. If an individual’s federal tax form has been fraudulently filed, it’s likely the state return has also been fraudulently filed. Check with your state and report the incident to your state revenue agency. A list of resources in each state is available at http://www.efile.com/tax-return-identity-theft-and-refund-fraud/#how-to-report-tax-fraud-to-states. CEO spoofing victims should also contact the FBI and local law enforcement.

Scammers Go Phishing: Business Email Compromise on the Rise - slide 7

Place a Fraud Alert

Place a fraud alert on your credit file.

Individuals who have been a victim of identity and tax fraud, as well as those preemptively worried about it, can contact one of the three major credit bureaus (TransUnion, Experian, Exquifax) and request that an initial fraud alert be placed on their credit file for free. This ensures that creditors must contact the individual and confirm permission with them before opening any new accounts. Requesting from just one bureau will also place the fraud alert on the individual’s file with the other two bureaus. This alert lasts for 90 days and can be renewed.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.