Download the latest Phishing Threat Trends Report to understand the hot topics dominating the headlines, from the rise of ‘quishing’ and AI-powered attacks to the evolution of payloads in phishing campaigns.
Business Email Compromise
Protect your people from socially engineered phishing attacks, with Egress Defend.
Business email compromise is the most common phishing threat
of cybercrime losses reported to FBI caused by BEC
of cyberattacks involve social engineering
has been lost due to BEC attacks
Exploiting your trusted relationships
Business email compromise (BEC) is one of the hardest attack techniques to detect. Threat actors impersonate or hijack a legitimate business email account that belongs to a trusted vendor, CEO, or another executive, using social engineering to trick their target into fraudulently transferring funds or divulging sensitive information.
The signature-based detection in Microsoft 365 native security and secure email gateways (SEGs) cannot detect BEC attacks at the rate modern enterprises need to prevent financial losses, data exfiltration, and reputational damage.
Egress Defend uses intelligent technology to detect BEC attacks
- 1 Display name impersonation detection. This is difficult for users to spot, especially on mobile devices, and as the domain is real, it passes SPF checks.
- 2 Homograph attack. The domain c0mpany.com is used to fool the user into thinking this is a genuine email. However, the display name matches that used by an internal user. An internal user with an external domain is treated with suspicion by Egress Defend.
Natural language processing (NLP) enhances detection of BEC attacks
- 3 Linguistic analysis. Egress Defend detects that the language used in this email includes credibility statements that incite a sense of urgency and try to deter the user from confirming legitimacy through other means.
- 4 CEO impersonation. Using NLP, Defend detects that the attacker is posing as the CEO to appear as a trusted and important sender to try to increase the likelihood that the user will engage.
2024 Phishing Threat Trends Report: January - March insights
Download reportCut through the noise to highlight the risks that matter
Reporting on threats such as BEC attacks in your email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.
Egress Defend’s intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks, and, where necessary, remediate them.
See for yourself: take the Egress Defend Admin TourActionable intelligence
Data and analytics should not overwhelm you with information. Augmented threat intelligence into attack types, payload, and supply chain health gives Security teams what they need to take decisive action that mitigate threats.
Our real-time threat feed offers insights and statistics into email details, type of attack, threat levels, authentication checks, communication history, and how your people interacted with the email.
Explore the Egress Security CenterAre you curious about how Egress Defend can safeguard your organization against BEC attacks?
What our customers say
Hear from companies and organizations who use Egress Defend to prevent Business Email Compromise.
We recognized that one layer is not enough to detect and neutralize the numerous advanced phishing threats targeting GMMH day-to-day work.
Related resources
Learn how our full suite of advanced email protection technologies work together to mitigate both inbound and outbound email risks like Business Email Compromise.
Egress Intelligent Email Security
Protect against sophisticated inbound and outbound email threats without creating productivity roadblocks.