How to Stop Business Email Compromise (BEC) with Defend

Business email compromise is the most common phishing threat

37%

of cybercrime losses reported to FBI caused by BEC threats

98%

of cyberattacks involve social engineering

$43bn

has been lost due to BEC attacks

What is Business Email Compromise?

BEC threats are the hardest phishing attacks to detect. Threat actors impersonate or hijack a legitimate business email account that belongs to a trusted vendor, CEO, or another executive, using social engineering to trick their target into fraudulently transferring funds or divulging sensitive information.

The signature-based detection in Microsoft 365 native security and secure email gateways (SEGs) cannot detect BEC attacks at the rate modern enterprises need to prevent financial losses, data exfiltration, and reputational damage.

In 2021, the FBI reported nearly $2.4B in losses as a result of BEC and 66% of organizations suffered a successful attack.

- "Fighting Phishing: The IT Leader's View"

Defend uses intelligent technology to detect BEC attacks

1. Display name impersonation detection. This is difficult for users to spot, especially on mobile devices, and as the domain is real, it passes SPF checks.

2. Homograph attack. The domain c0mpany.com is used to fool the user into thinking this BEC threat is a genuine email. However, the display name matches that used by an internal user. An internal user with an external domain is treated with suspicion by Defend.

We’re really pleased with Defend. We’re now detecting a broader range of advanced phishing threats, including BEC and impersonation attacks.

Kevin Orritt, Cyber Security Manager, GMMH

Natural language processing (NLP) enhances BEC detection

3. Linguistic analysis. Defend detects that the language used in this email includes credibility statements that incite a sense of urgency and try to deter the user from confirming legitimacy through other means.

4. CEO impersonation. Using NLP, Defend detects that the attacker is posing as the CEO to appear as a trusted and important sender to try to increase the likelihood that the user will engage.

Cut through the noise to highlight the risks that matter

Reporting on BEC threats and other phishing attacks can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.

Defend’s intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks, and, where necessary, remediate them.

Actionable intelligence into BEC threats

Data and analytics should not overwhelm you with information. Augmented threat intelligence into attack types, payload, and supply chain health gives Security teams what they need to take decisive action that mitigate BEC threats.

Our real-time threat feed offers insights and statistics into email details, type of attack, threat levels, authentication checks, communication history, and how your people interacted with the email.

See KnowBe4 Defend in action

Request a personalized demo to see how Defend will help you defend against the most sophisticated phishing emails
Request a demo