We’ve all heard about BEC, and many of us have seen it impact our financial institutions first hand. Business Email Compromise (BEC), also known as “whaling” or “CEO Fraud”, is a form of spear phishing that is the source of billions of dollars of fraud to date. It involves fraudsters impersonating executive management in an organization either by taking control of their email account, or by creating a fake account on a free webmail service (such as gmail or yahoo). The impersonated emails then typically make requests to internal employees to send out sensitive data or to wire large sums of money.
And though BEC can affect banks and credit unions directly, the purpose of this post is to ask the question: How do we help our customers avoid a scheme of this nature?
It’s an important one to answer because of the reputational and financial implications when a situation like this arises. Community banks are often left holding the bag when BEC results in wire fraud, regardless of who's actually to blame. And because of the push to make wires easier for business customers, this is becoming a more frequent occurrence.
To avoid this, many banks have verification procedures for wire requests from cash management portals and conventional wire transfer channels (including OOB, MFA, and Dual Control), but that model relies on the trust factor that the person initiating the wire is correct.
While you could easily make the argument that the typical controls in place are “good enough” and that the customer has to be responsible for their own actions, this approach leaves the door open to some finger pointing if your customer does fall victim to a BEC attack (right or wrong).
I believe to stop BEC we have to take things a step further. Evolving the current level of awareness training for business customers is what will be most effective in combating BEC.
Here are some ideas for doing just that: