The Numbers Nobody Wants to Talk About: BEC Losses Hit $2.9 Billion in 2023
Identity Access   May 4, 2026

The Numbers Nobody Wants to Talk About: BEC Losses Hit $2.9 Billion in 2023

The FBI’s Internet Crime Complaint Center received over 21,000 BEC complaints with adjusted losses exceeding $2.9 billion in 2023. Industry analysts estimate the real number is significantly higher because most businesses quietly absorb losses rather than report them publicly.

The average BEC wire transfer loss for mid-size companies now sits around $498,000, according to an AFP/Fortress Security survey. For companies under 100 employees, the median loss is lower but still devastating in proportion to revenue.

Why BEC Keeps Winning

BEC works because it doesn’t hack systems — it hacks people. An attacker impersonates a vendor, CEO, or IT administrator and asks for something routine: an invoice paid to a new account, a wire transfer, a change to direct deposit credentials.

The sophistication has increased dramatically. Modern BEC actors research their targets: they know the vendor relationships, the CFO’s travel schedule, the timing of quarterly payments. They don’t need malware or phishing links. A convincing email voice and a sense of urgency are enough.

The Vendor Impersonation Trap

The most common BEC variant — vendor email compromise — exploits the trust between businesses. An attacker compromises a vendor’s email, monitors invoices, and then sends a convincing update asking the customer to route payment to a new account.

By the time the real vendor follows up on the unpaid invoice, the money is gone and the bank account is empty. Recovery rates are near zero. Law enforcement can track the funds but the money moves through multiple intermediary accounts in days.

The Red Flags Nobody Catches in Time

BEC emails share common patterns that are obvious in retrospect:

Urgency is the biggest tell. “We need this processed today” or “The CEO is asking personally” creates pressure that bypasses normal verification steps. Legitimate requests from real vendors rarely demand same-day wire transfers out of nowhere.

What Actually Works

The most effective BEC defense is also the simplest: out-of-band verification. If someone requests a wire transfer or payment change via email, you call them back on a known-good number — not the number in the email. This one control breaks the attack chain entirely.

For vendors and financial requests, establish a callback verification process as standard operating procedure. Any request to change payment details should trigger a mandatory confirmation call before processing.

Dual authorization on wire transfers above a threshold dollar amount adds a second human to the decision, which dramatically reduces the effectiveness of urgency-based attacks.

Training employees to recognize BEC patterns is table stakes. But training alone fails because BEC emails don’t look like phishing — they look like normal business communication. The cultural shift that matters is making it safe for employees to slow down and verify, without feeling like they’re questioning authority or slowing down the business.

The Underreporting Problem

The $2.9 billion figure from the FBI is a floor, not a ceiling. Companies don’t report BEC incidents because of reputational concerns, legal exposure, and the uncomfortable admission that someone in accounting got fooled by a stranger pretending to be a trusted vendor.

This silence benefits attackers. Every successful BEC that goes unreported means the attackers can use the same playbook again against another company in the same industry, with the same vendor relationships, without fear of law enforcement catching on.

BEC is not a technology problem you can solve with better email filtering. It’s a human problem that requires human solutions: verified processes, dual controls, and a culture where verification is a habit, not a怀疑.

~/other/posts

Keep Reading

The Extension Layer: Why Your Browser Add-Ons Are a Ticking Time Bomb for Small Businesses
Apr 27, 2026 Identity Access

The Extension Layer: Why Your Browser Add-Ons Are a Ticking Time Bomb for Small Businesses

Last month, researchers flagged 73 malicious VS Code extensions delivering GlassWorm v2 malware — backdoors that spread across IDEs and steal credentials from developers who thought they were installing productivity tools. The unsettling part: these extensions had been sitting in the marketplace since December 2025, building reputation before the malicious update dropped. Then came the […]

Why Small Businesses Don’t Need to Outrun the Bear
Apr 20, 2026 Identity Access

Why Small Businesses Don’t Need to Outrun the Bear

The good news: small practices don’t need to outrun the bear. They just need to be harder to penetrate than the practice down the street. Attackers are opportunistic. Most ransomware groups run automated scanning that flags easy targets — unpatched VPNs, legacy protocols left exposed, admin accounts without MFA. Solid MFA, current patches, and offline […]

AI Security Governance: Building a Framework Before You Need One
Apr 20, 2026 Identity Access

AI Security Governance: Building a Framework Before You Need One

Most organizations are deploying AI faster than they’re building security controls for it. The result is a growing gap between what AI can do in your environment and what your security team can actually see or defend. AI security governance is about closing that gap — establishing a structured set of policies, controls, and oversight […]