{"id":9375,"date":"2020-11-12T09:52:08","date_gmt":"2020-11-12T14:52:08","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=9375"},"modified":"2021-11-09T14:19:18","modified_gmt":"2021-11-09T19:19:18","slug":"business-email-compromise-attacks","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/","title":{"rendered":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg\" alt=\"\" class=\"wp-image-9377\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<i><br \/> By Stephanie Mitchell, marketing manager<\/i> <span style=\"padding-left:150px\"><strong>Share this post <\/strong>\n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n\n\n\n<p>Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion<a href=\"#_ftn1\"><sup>[1]<\/sup><sup><\/sup><\/a>, but it\u2019s not an attack that everyone is familiar with.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>What is business email compromise?<\/strong><\/h6>\n\n\n\n<p>BEC is a form of email phishing that targets companies rather than the public. Emails appear to come from someone the victim already knows\u2014usually a higher status colleague\u2014asking them to do something ordinary, like setting up and paying a new supplier, or paying an invoice or a staff member.<\/p>\n\n\n\n<p>BEC attack emails have many of the same characteristics as other forms of phishing emails; they impersonate others, seek to gain data or money from unsuspecting victims, and messaging conveys a sense of urgency.<\/p>\n\n\n\n<p>What makes them different is their sophistication, and their outcomes. Why? Because the scammer really does their homework.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>How do BEC scams work?<\/strong><\/h6>\n\n\n\n<p>For a BEC scam to be successful, the victim has to believe the email being sent is genuine. The telltale signs of other phishing emails\u2014spelling errors, noticeably bogus email addresses, unknown senders\u2014aren\u2019t present in BEC scams. Here\u2019s how BEC is achieved:<\/p>\n\n\n\n<ol type=\"1\"><li><strong>Research.<\/strong> A scammer can spend months researching the company and the person within that company they want to target. Social media platforms like LinkedIn\u00ae, Facebook\u00ae, etc. are goldmines for personal information, which scammers use to find out more about their targets, like their roles and responsibilities, their line manager, and direct reports, even the way they write or communicate. Scammers need to know both the person they\u2019re imitating and the person they\u2019re targeting.<br \/><br \/><\/li><li><strong>Getting the right domain.<\/strong> The scammer will buy a domain that\u2019s very close to the genuine brand they\u2019re targeting, e.g., te<strong>r<\/strong>amundi.net as opposed to te<strong>rr<\/strong>amundi.net. At a glance, most people would not notice the missing second \u201cr.\u201d They can then use this to set up an email address that matches the person\u2019s they\u2019re imitating, but for that one letter difference\u2014 \u201cjohn.doe@teramundi.net\u201d (fake) as opposed to \u201cjohn.doe@terramundi.net\u201d (genuine).<br \/><br \/><\/li><li><strong>Manipulation. <\/strong>BEC scams rely on social engineering techniques to get victims to do what the attacker wants. Scammers use a range of methods to panic the recipient into believing the email is from their superior so the victim takes action quickly, including:<br \/><br \/><ul><li>Mimicking the writing style of the sender<\/li><li>Sending emails late in the day or week with urgent messaging, like \u201cI need this done before the end of the day\u201d<\/li><li> Using excuses as to why the scammer can\u2019t answer any follow-up questions, indicating the action should be fulfilled without question, for example, \u201cI\u2019ll be in meetings for the rest of the day\u201d<br \/><br \/><\/li><\/ul><\/li><\/ol>\n\n\n\n<p>Unlike other phishing attempts, BEC scams don\u2019t need to cast a wide net in the hope that a few people will take the bait. They\u2019re highly targeted and not easy to spot. Targeting companies rather than individuals means that their efforts yield a higher reward.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>How to combat BEC scams<\/strong><\/h6>\n\n\n\n<p>There are two elements to mitigate against BEC attacks\u2014technical and human. Technical elements are security protocols that can stop the email from reaching the recipient in the first place. The human element is about training your staff on what to look for. Unfortunately, phishing scams rely on human error, and BEC scams are no exception.<\/p>\n\n\n\n<p><h6><strong>Technical protection<br \/><\/strong><\/h6>Ensure that you have an email authentication protocol in place, like domain-based message authentication, reporting, and conformance (DMARC). Essentially, DMARC allows you to specify how to handle unauthenticated emails, either sending them to the junk folder or blocking them altogether. Having a robust monitoring solution in place will also give you a full view of the phishing landscape for your company, helping you spot anomalies and take quick action.<\/p>\n\n\n\n<p><h6><strong>Staff training<br \/><\/strong><\/h6>It\u2019s easy to be fooled by a phishing email as sophisticated as a BEC scam. Recent research shows that 43% of global workers are unsure what a phishing attack is<a href=\"#_ftn2\"><sup>[2]<\/sup><sup><\/sup><\/a>\u2014so educating your staff is key. Having regular cybersecurity awareness training as part of your employee training program will help educate your staff on what to look out for. It\u2019s also important to have a process for what to do if one of your employees suspects a BEC phishing attempt\u2014which would usually involve confirming the authenticity of the request with the sender either via telephone or face-to-face (where possible).<\/p>\n\n\n\n<p><h6><strong>We\u2019re ready to talk<br \/><\/strong><\/h6>If you\u2019d like to talk to one of our experts about our Fraud Protection solutions, <a href=\"https:\/\/www.cscdbs.com\/en\/enterprise-fraud-prevention\/\">complete this form<\/a> and one of our team members will be in contact.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-default\"\/>\n\n\n\n<p><a href=\"#_ftnref1\">[1]<\/a>casselsalpeter.com\/wp-content\/uploads\/2018\/06\/CS-BusinessNewsDaily-19SmallBusinessTrendsandPredictionsfor2018-mediaclip-6.19.18.pdf<\/p>\n\n\n\n<p><a href=\"#_ftnref2\">[2]<\/a>securityboulevard.com\/2020\/10\/43-of-global-employees-are-not-sure-what-a-phishing-attack-is-2\/<\/p>\n\n\n<p><\/p>\n<p><\/p><\/span>","protected":false},"excerpt":{"rendered":"<p>Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,548,521],"tags":[],"class_list":["post-9375","post","type-post","status-publish","format-standard","hentry","category-brands","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC<\/title>\n<meta name=\"description\" content=\"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC\" \/>\n<meta property=\"og:description\" content=\"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-12T14:52:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-09T19:19:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed\",\"datePublished\":\"2020-11-12T14:52:08+00:00\",\"dateModified\":\"2021-11-09T19:19:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/\"},\"wordCount\":803,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DBS-BLog-Image-1024x536.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/\",\"name\":\"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DBS-BLog-Image-1024x536.jpg\",\"datePublished\":\"2020-11-12T14:52:08+00:00\",\"dateModified\":\"2021-11-09T19:19:18+00:00\",\"description\":\"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/11\\\/DBS-BLog-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/11\\\/DBS-BLog-Image.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/business-email-compromise-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC","description":"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC","og_description":"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.","og_url":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-11-12T14:52:08+00:00","article_modified_time":"2021-11-09T19:19:18+00:00","og_image":[{"url":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed","datePublished":"2020-11-12T14:52:08+00:00","dateModified":"2021-11-09T19:19:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/"},"wordCount":803,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg","articleSection":["Brand Protection","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/","url":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/","name":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/11\/DBS-BLog-Image-1024x536.jpg","datePublished":"2020-11-12T14:52:08+00:00","dateModified":"2021-11-09T19:19:18+00:00","description":"Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion[1], but it\u2019s not an attack that everyone is familiar with.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/11\/DBS-BLog-Image.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/business-email-compromise-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business Email Compromise Attacks: The Big Phishing Scam That\u2019s Easily Missed"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=9375"}],"version-history":[{"count":11,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9375\/revisions"}],"predecessor-version":[{"id":9387,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9375\/revisions\/9387"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=9375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=9375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=9375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}