ScamLens
Critical Average Loss: $50,000 Typical Duration: 1-7 days

CEO Fraud: How Scammers Impersonate Executives

CEO fraud, also called business email compromise (BEC), is a sophisticated scam where criminals impersonate company executives to trick employees into transferring funds or sensitive information. The scammer typically targets finance departments or employees with access to company accounts, creating a false sense of urgency to bypass normal verification procedures. According to the FBI, BEC schemes cost organizations over $2.7 billion annually, with the average incident resulting in losses between $50,000 and $200,000. This scam has evolved significantly since 2013, when it first emerged; modern variants now include payroll diversion schemes, vendor payment fraud, and wire transfer requests disguised as confidential acquisitions. Unlike phishing attacks that cast a wide net, CEO fraud is highly targeted and researched, with scammers studying company hierarchies, employee relationships, and financial processes before launching attacks.

Common Tactics

  • Sending emails from spoofed or lookalike email addresses that mimic the CEO or CFO's actual address, often differing by one character or using similar domain names like 'companynme.com' instead of 'company.com'.
  • Creating artificial urgency by claiming a confidential acquisition, emergency wire transfer, or time-sensitive business matter that requires immediate action before regular business hours or outside normal verification procedures.
  • Requesting wire transfers to newly opened bank accounts, cryptocurrency wallets, or offshore accounts, often disguised as vendor payments, employee bonuses, or settlement fees that seem plausible to finance staff.
  • Using reconnaissance gathered from LinkedIn, company websites, and social media to reference specific employees, projects, or financial details that make the request appear legitimate and well-informed.
  • Instructing victims to maintain absolute secrecy and avoid discussing the transaction with other employees, claiming the matter is confidential due to acquisition discussions, regulatory issues, or legal matters.
  • Following up with additional pressure emails or calls from 'attorneys' or 'accountants' posing as third parties who reinforce the urgency and legitimacy of the financial request.

How to Identify

  • Emails from executives requesting unusual wire transfers, especially to new vendors or accounts, or asking to bypass standard payment approval processes without clear business justification.
  • Sender addresses that are nearly identical to known executives' emails but contain subtle spelling variations, alternative domain extensions, or use external email services instead of company domains.
  • Requests marked as highly confidential, urgent, or time-sensitive with instructions to avoid discussing the matter with accounting, legal, or other departments who would normally verify such transactions.
  • Grammar, tone, or formatting inconsistencies in emails from executives, such as unusual phrasing, missing contact information, or lack of standard email signatures typically used by company leadership.
  • Wire transfer requests to unfamiliar vendors, new payees, or accounts in different countries, particularly when the requesting executive normally communicates through other channels or has never requested wire transfers before.
  • Follow-up communications from supposed attorneys, accountants, or business associates who add pressure and legitimacy by confirming details of the transaction or providing false legal documentation.

How to Protect Yourself

  • Establish mandatory verification protocols for all wire transfers and fund transfers exceeding a specified threshold ($10,000+), requiring verbal confirmation through a known phone number, not one provided in the email.
  • Create a company-wide list of email addresses and communication preferences for all executives, and train employees to verify requests through alternate channels (phone call to known number, in-person verification, or secondary email).
  • Implement multi-factor authentication on all email accounts, particularly those with financial access, and enable email domain authentication standards (SPF, DKIM, DMARC) to prevent email spoofing.
  • Establish a policy requiring that wire transfer requests always be approved by at least two employees in different departments, with documented approval trails separate from email communications.
  • Conduct regular security awareness training specifically focused on CEO fraud, including simulated phishing emails and scenarios that test employees' ability to identify spoofed communications and follow verification procedures.
  • Monitor for anomalous account activity, such as email forwarding rules, unexpected login locations, or new device access to executive accounts, which may indicate account compromise before fraud occurs.

Real-World Examples

A finance manager at a mid-sized manufacturing company received an email from 'the CEO' requesting an urgent wire transfer of $85,000 to a new vendor account for a confidential acquisition closing that day. The email came from a domain that differed by one letter from the company's actual domain, and included a request to keep the matter private. Within hours, the employee transferred the funds without following the company's normal three-person approval process. By the time the real CEO returned from a client meeting and asked about the transfer, the money had been moved through multiple international accounts and was unrecoverable.

An HR director at a technology firm received what appeared to be a message from the CFO requesting employee W-2 information and direct deposit details for 'payroll system updates.' The scammer gained access to personal information for 240 employees, which was then used in identity theft and tax refund fraud schemes. The email address used was almost identical to the CFO's actual address but used a slightly different domain. HR staff did not verify through their normal channels because the request came from someone they 'recognized' and involved standard business processes.

A startup's accounting department received multiple emails over three days from the company's co-founder requesting wire transfers totaling $180,000 for investor relations expenses and legal settlement fees related to a pending acquisition. The emails included specific reference to board members and financial details found on the company's private investor documents. Follow-up calls from someone claiming to be the company's attorney reinforced the urgency. The finance team made the first two transfers before realizing the emails were fraudulent when the co-founder's actual assistant called to confirm a completely different payment.

Frequently Asked Questions

How do scammers get access to such detailed information about our company and employees?
Scammers use publicly available sources like LinkedIn company pages, SEC filings, company websites, and social media profiles to map organizational hierarchies and gather employee names. They also purchase leaked data from data breaches, monitor press releases about acquisitions or business dealings, and sometimes conduct surveillance by phoning employees to extract information. More sophisticated criminals may monitor your company's email communications if they've compromised an employee's account or internet connection.
What's the difference between CEO fraud and regular phishing emails?
CEO fraud is highly targeted and personalized to your specific company and employees, often referencing real business relationships and accurate organizational details. Regular phishing casts a wide net with generic messages hoping some recipients will respond. CEO fraud also typically targets specific individuals with financial authority and uses social engineering to create urgency, whereas phishing usually just tricks people into clicking malicious links or downloading infected files.
Can't our email system stop these fraudulent emails automatically?
Modern email security tools can catch obvious spoofing attempts and some variants, but sophisticated CEO fraud often passes through because scammers use legitimate email services, lookalike domains, or compromised company email accounts. Email authentication standards like SPF and DMARC help but aren't foolproof. The most effective defense combines email filtering with human verification procedures for financial requests, since even perfect email security won't stop a scammer using a nearly-identical domain address.
If our company falls victim to CEO fraud, can we recover the money?
Recovery is extremely difficult once funds reach overseas accounts, which happens in most cases within hours. If the receiving bank is in the U.S., there's a small window (typically 24-48 hours) to request the bank freeze and return funds, but international transfers are rarely recoverable. This is why prevention through verification procedures is far more important than recovery efforts. Immediately contact your bank and law enforcement (FBI IC3) if fraud occurs, but focus primarily on preventing future incidents.
Should we hold employees liable financially if they fall victim to CEO fraud?
Holding employees financially responsible for CEO fraud is counterproductive and often illegal under employment laws. Scammers specifically exploit normal business processes and social engineering; employees acting in good faith to fulfill what appears to be a legitimate executive request should not bear financial responsibility. Instead, investigate how the scammer bypassed controls, improve verification procedures, and provide non-punitive retraining to help employees recognize similar attempts in the future.

Think you encountered this scam?