Social Engineering Attacks
AuthorDiscord
  • Hacking Humans
  • 🐟Phishing
    • 🟢Spear Phishing
    • 🟢Vishing
    • 🟢Smishing
    • 🟢Clone Phishing
    • 🟢Link Manipulation
    • 🟢Watering Hole Attack
    • 🟢Business Email Compromise
  • 🎩Pretexting
    • 🟢Tech Support Scam
    • CEO Fraud Scam
    • 🟢Trust Scam
    • Job Scam
    • 🟢Relationship Scam
    • 🟢Charity Scam
    • 🟢Lottery Scam
  • 🛠️Baiting
    • USB Drop
    • Fake Wi-Fi Hotspot
    • Evil Twin Attack
    • QR Code Scam
    • Social Media Scam
    • Free Gift Scam
    • Black Hat SEO
  • 🥨Quid Pro Quo
    • Conference Scam
    • Customer Service Scam
    • Fake Software Scam
    • Social Networking Scam
    • Website Community Scam
    • Alarm System Scam
    • IT Support Scam
  • Tailgating
    • Piggybacking
    • Keylogging
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Credit Card Skimming
    • Bluetooth Hacking
  • Group 1
    • Presentations
Powered by GitBook
On this page

Was this helpful?

  1. Phishing

Business Email Compromise

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is a sophisticated scam targeting businesses working with foreign suppliers and companies that regularly perform wire transfer payments.

BEC attackers often impersonate company executives or vendors, using phishing techniques to compromise official email accounts.

Once access is gained, they fraudulently request wire transfers or sensitive data from unsuspecting employees. BEC scams rely heavily on social engineering methods to deceive individuals into performing financial transactions or divulging confidential information under the guise of legitimate business activities.

PreviousWatering Hole AttackNextTech Support Scam

Last updated 1 year ago

Was this helpful?

🐟
🟢