Skip to Main

Business Email Compromise (BEC) Attacks

close up of fingers typing on laptop keyboard with superimposed envelope graphic

A business email compromise (BEC) attack is a type of phishing attack in which a cybercriminal impersonates a trusted contact and uses social engineering techniques to trick an email recipient into transferring funds into a fraudulent account. BEC techniques are used to make requests for gift card purchases, wire transfers, real estate transactions as well as to reroute employees’ direct deposits.

BEC Prevention

  • Be on guard with all unsolicited emails and phone calls.
  • Verify originating email addresses and phone numbers when sensitive requests are made.
  • Confirm payment and purchase requests in person if possible or by calling the person to make sure it is legitimate.

If you believe you have been a victim of a BEC attack, alert your supervisor immediately.

View More Updates


Questions about Information Security?

Office of Information Security
214-648-7600

informationsecurity@UTSouthwestern.edu