Business email image

According to IC3, since the beginning of 2015 there
has been a 270 percent increase in identified
Business Email Compromise (BEC) victims. Victim
companies have come from all 50 U.S. states and
nearly 80 different countries.
BEC Graph More

FBI calls BEC "a serious threat on a global scale", and calls out that "companies should make themselves aware of the BEC threat and take measures to avoid becoming victims."

Using social engineering, BEC is immune to
traditional firewalls, cryptography, spam filters
and anti-virus technology. Scammers use spoofing,
account takeovers and deceptive sender names
to masquerade as trusted parties.

fake email
According to industry estimates, a majority of BEC emails come from strangers who register accounts or domains that look very similar to entities trusted by the victims. Traditional filters do not block these attacks. And most recipients do not notice the subtle differences.

ZapFraud's Structural Deception Analysis™ does.

attachment icon
What does your company do when a trusted service provider sends an invoice? And what do you do when the trusted service provider was compromised, and the invoice contains the scammer's payment instructions?

ZapFraud automatically verifies high-risk emails with senders, using second factor technologies.

spoofed email icon
How do you know that your incoming email was not spoofed when not all your contacts support DMARC?

ZapFraud's Structural Deception Analysis™ identifies likely spoof, automatically verifying high-risk emails with senders using a variety of second factor authentication options.

ZapFraud tracks and blocks scam

Learn More

facebook logo twitter logo linkedin logo