Business Email Compromise

BEC scams redirect legitimate business payments using impersonation, urgency, and subtle email changes. This guide helps you preserve evidence and take the right next step.

Request a Free Consultation

Common warning signs

services

Urgent payment requests

Pressure to pay quickly, secretly, or outside standard approval steps.

services

Account detail changes

Last-minute bank updates, new beneficiary details, or “temporary” instructions.

services

Lookalike emails

Domains that differ by one character, odd reply-to addresses, or unusual signatures.

Evidence to preserve

Full email headers

Headers help identify routing and spoofing patterns beyond screenshots.

Invoice trail

Original invoice + attachments + any “updated bank details” messages.

Payment confirmations

Receipts, bank confirmations, timestamps, beneficiary details.

Mailbox rules/logs

Forwarding rules, MFA changes, sign-in activity and IP/location logs.

Next steps

If funds were sent, contact your bank immediately and request a recall. Preserve evidence before making changes to systems. If an inbox is compromised, reset credentials and enable MFA.

You can also review Scam Types and How It Works for our general process.

Back to Resources
img