Business Email Compromise (BEC) is a sophisticated type of phishing attack where the attacker targets businesses and individuals who use email as a primary method of communication. The goal is to deceive employees, executives, or partners into transferring money or sensitive data to the attacker’s account or enabling some form of unauthorized action. These attacks rely more on social engineering than on malware or system vulnerabilities, making them difficult to detect.
In this case, a logistics company fell victim to a Business Email Compromise (BEC) attack through an invoice scam, resulting in the unauthorized transfer of over $100,000 to the attacker’s account. This attack showcases how cybercriminals exploit trust, urgency, and communication loopholes to deceive companies into paying fraudulent invoices.
The logistics company received an email from what appeared to be one of their regular vendors, requesting a change in the method of payment from the usual process to ACH (Automated Clearing House). Over a series of emails, the attacker, impersonating the vendor, created a sense of urgency by repeatedly asking, “When is the money going to get here?”
An employee at the logistics company, pressured by the urgency, assured the impersonator that they would try to get the payment processed that day. Shortly after, the attacker followed up with even more insistence, amplifying the pressure to transfer the money quickly.
The first red flag appeared when the impersonator requested that the payment be switched to a wire transfer instead of ACH, citing issues with the original method. The employee recognized that this wasn’t a normal request, but by that time, the process was already in motion, and the sense of urgency made it difficult to pause and verify the transaction.
In an interview with a company employee involved in the transaction, they shared the moment they realized something was wrong:
"We get the email stating that he wants to be ACH, and then it was a constant. 'When is the money gonna get here? When is the money gonna get here?' And I would say, 'I'm trying to get it today.' About an hour later, he calls back and says, 'But that's not my cell phone number on the signature line.' I'm like, I don't care. I have no ethic for this guy anymore. I think he's completely a crook."
At this point, the employee began to question the legitimacy of the request, recognizing the unusual urgency and inconsistency in the contact information. When the vendor clarified that the phone number on the signature line was incorrect, the employee's suspicions were confirmed. The realization that they had been communicating with a fraudster set in, but by then, the payment had already been wired to the attacker.