Ready to Master BEC? Let Us Train YOU to Lead the 'Tabletop-In-A-Box' for Your Clients

March 3, 2026|2:00 PM ET|Past event

Business Email Compromise attacks surged in sophistication and volume through 2025, driving global losses into billions as fraudsters exploit AI and hijack legitimate email threads to siphon funds undetected.

Key takeaways

  • BEC losses reached $2.77 billion in the US alone in 2024 per FBI data, with attacks rising 15-30% in early 2025 amid AI-enhanced impersonation and thread hijacking tactics.
  • Small and mid-sized businesses face average per-incident losses around $137,000, while evolving dual-channel attacks using SMS or messaging apps bypass traditional email defenses.
  • Heightened regulatory scrutiny, including SEC disclosure rules for material incidents since late 2023, forces public companies to report cyber events swiftly, amplifying reputational and financial risks from undetected BEC.

The Escalating Cost of Trust Exploitation

Business Email Compromise (BEC) remains one of the most damaging forms of cyber fraud, tricking employees into wiring money or sharing credentials by impersonating trusted colleagues, vendors, or executives. Unlike malware-driven breaches, BEC relies on social engineering, often without technical exploits, making it hard to detect with conventional tools.

Recent years have seen sharp increases in both volume and effectiveness. The FBI's 2024 Internet Crime Report documented $2.77 billion in US losses from BEC, second only to investment fraud, with total internet crime losses hitting $16.6 billion—a 33% jump from 2023. Into 2025, reports indicate continued escalation: attacks rose 15% year-over-year according to some security firms, while others noted a 30% spike in the first quarter alone. BEC now accounts for around 32% of email threats, with thread hijacking—where attackers insert themselves into ongoing conversations—comprising over 28% of incidents.

The stakes are concrete and mounting. Average losses per reported BEC incident have climbed to about $137,000, up significantly from earlier years, and smaller organizations are hit hardest, with some facing weekly probabilities as high as 70% for at least one attempt. Globally, cumulative BEC losses exceed $55 billion over the past decade. Fraudsters increasingly use AI to craft flawless messages, bypass multi-factor authentication via adversary-in-the-middle techniques, and shift conversations to dual channels like SMS or WhatsApp to evade email filters.

Non-obvious tensions emerge in the response landscape. While technical defenses improve, the human element—trust in familiar communications—remains the weak link, and over-reliance on automation risks missing context-aware attacks. Regulatory pressures add complexity: the SEC's 2023 rules mandate public companies disclose material incidents within four business days on Form 8-K, heightening scrutiny on governance and potentially triggering stock volatility or shareholder suits if BEC events prove material. Yet many incidents stay under the radar, especially at private firms or in sectors with lower reporting incentives.

The shift toward more precise, conversation-based fraud exploits organizational routines, such as payment cycles, when vigilance dips. This evolution challenges the assumption that email security alone suffices, pushing a need for broader verification protocols and simulation-based preparedness.

We use cookies to measure site usage. Privacy Policy