It's not hard to see why BEC works. Requests from the appropriate person, requests for wire transfers or sensitive employee information may be part of a normal workday. But when those requests come from someone else, it can be a costly case of mistaken identity.
Falling for an impostor's email is easier than you might think. That's because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone.
Here's a roundup of the most high-profile (and low-minded) BEC and EAC attacks of the last 12 months.