Business Email Compromise Absa | Corporate and Investment Banking > Insights and Events > Business Email Compromise SHARE Business Email Compromise (BEC), is a criminal act where criminals illegally access the victim’s email account and communicate as if they are the “user”. This sophisticated scam targets both businesses and individuals. How it happens and red flags to look out for Fraudsters gain unauthorized access to an email account and impersonate the user i.e. senior executive in organizations, suppliers, attorneys etc in order to trick the recipient into making payments or changing bank details into the fraudsters account and at times also requesting for sensitive information. Be cautious of requests from an unknown ‘contact’ or point of contact at the organisation. Look out for spoofed email addresses that are made to look like that of the organisation for example @absa.africa.com instead of @absa.africa. Be cautious of emails with a sense of urgency, requesting for personal information and/or sensitive company information. How to respond and protect yourself or organisation Always confirm any email change of banking detail requests / instructions by contacting the sender using known contact details you have on record. Do not reply to the email or use the contact details included in the email. Verify the bank account details using the Account Verification Service (AVS) available to you, before making any payments. Always examine the email address and header information to ensure that an email is from a legitimate contact. Organisations to implement email security tools to detect spoofed emails and phishing emails. Reporting options To report fraud-related incidents, please email cibfraud@absa.africa To report phishing incidents, please email secmon@absa.co.za To report a matter after business hours, please contact our Fraud Hotline on 0860 500 703 or 010 211 3117. https://cib.absa.africa/wp-content/uploads/2020/07/file_example_MP3_700KB.mp3 Related Articles FRAUD Fraud Alert Fraud is more than just a crime—it’s a global threat that silently drains billions from economies, shatters businesses, and ruins lives. From Social engineering, Cyber scams and identity theft to corporate deception, embezzlement and financial misstatements, fraud erodes trust in systems we rely on daily. Read more FRAUD Spyware Spyware involves the use of malicious software to covertly infiltrate computers or networks with the intent of collecting sensitive information. The information collected can then be used by fraudsters to commit fraud, including unauthorised access to bank accounts, theft of corporate data, and manipulation of financial transactions. Read more FRAUD Keylogger Keyloggers are programs that record everything you type, including passwords, emails, and credit card numbers. Installed via Trojans or malicious downloads. Read more