Business Email Compromise is financial fraud in which an attacker impersonates a real person, usually an executive or finance staff, and convinces someone to send money or sensitive data voluntarily. It’s the abuse of organizational trust systems that just happen to run over email.
Attackers use spoofed or compromised email accounts to trick the victims. No links, no malware. Modern BEC often involves long-term mailbox access, where attackers watch conversations, learn tone, then strike with perfect context.
BEC matters because it turns everyday business behavior into an attack surface. Losses happen inside approved processes, so alerts don’t fire and recovery is rare. This makes BEC uniquely dangerous: it bypasses technical defenses and fails quietly until money is gone.
The incident started with social engineering of IT support to reset credentials. With identity access, attackers exfiltrated sensitive customer and loyalty data, then pivoted to financial extortion, threatening public release. Caesars reportedly paid $15 million to avoid data disclosure, faced regulatory scrutiny, reputational damage, and follow-on lawsuits.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more