Business Email Compromise Prevention Guide
BEC is the highest-return, lowest-effort attack targeting Australian professional services firms. How it works, how to recognise it, and the controls that stop it.

Business Email
Compromise
Prevention Guide
The highest-return, lowest-effort attack targeting Australian professional services firms. How it works, how to recognise it, and the controls that actually stop it.
stealthcyber.io
What Business Email Compromise Is
Business email compromise (BEC) is a financially motivated attack where a criminal uses a legitimate or convincingly spoofed email account to deceive someone into transferring funds, changing payment details, or disclosing sensitive information.
It does not require sophisticated malware. It does not need to bypass endpoint protection. It exploits trust, process gaps, and time pressure. A single successful BEC attack against a professional services firm can result in losses of tens to hundreds of thousands of dollars in a single transaction.
The ACCC consistently reports BEC as one of the highest-loss scam categories for Australian businesses. The actual figure is higher than reported, because many losses go unreported due to professional embarrassment.
How BEC Attacks Actually Work
Type 1: Spoofed Domain
The attacker sends email from a domain that closely resembles a legitimate one. yourfirm.com.au becomes yourfirm.co or y0urfirm.com.au. Visually similar at a glance, particularly on mobile where the full address is often truncated.
Type 2: Compromised Supplier/Client Account
The attacker compromises a supplier or client email account and sends fraudulent payment instructions from a completely legitimate address. The email thread may reference real prior conversations. The only tell is the payment details.
Type 3: Compromised Internal Account
An internal staff member's account is compromised. The attacker monitors the mailbox, identifies upcoming transactions, and inserts fraudulent instructions at the right moment. They may create inbox rules to hide replies from the legitimate user.
Type 4: Executive Impersonation
The attacker impersonates a senior person, typically targeting finance staff with urgent payment requests. Often sent on a Friday afternoon or before a holiday. The urgency and authority combination overrides normal verification instincts.
The Red Flags
Train every staff member who handles payments, invoices, or financial data to recognise these:
A combination of these, particularly urgency plus a request to bypass normal process, should trigger a verification call to a known number before any action is taken.
Technical Controls
Implement these with your IT provider:
Process Controls
Implement these in your operations:
If You Receive a Suspicious Email Right Now
Do not click any links or open any attachments in the email.
Do not reply to the email.
Do not call any phone number provided in the email.
Contact the apparent sender using a phone number you already have on file.
If the email requests a payment or account change, pause any related transaction until verification is complete.
Forward the email to your IT or security provider for analysis.
If you have already made a payment and suspect fraud, contact your bank immediately. Then contact your security provider and legal counsel.
If a BEC Attack Has Succeeded
Speed is everything. The window for recovering transferred funds closes quickly.
The Uncomfortable Reality
Most BEC losses are not recovered. Fund recovery is possible in some cases if the bank is contacted quickly, but it is not guaranteed and becomes less likely with every hour that passes.
The controls above are not complicated or expensive. The verification process costs a two-minute phone call. The technical controls are configurations, not new platforms. The businesses that suffer significant BEC losses almost always had the information they needed to prevent it.
The difference is whether anyone acted on it before the event rather than after.

Concerned about BEC exposure?
Stealth Cyber helps Australian professional services firms implement the technical and process controls that prevent BEC attacks. Get in touch for an independent assessment of your current exposure.
Website
stealthcyber.io
contact@stealthcyber.io
Phone
AU: +61 7 5230 8381
US: +1 (855) 774-2595
Offices
Gold Coast, Australia
São Paulo, Brazil
Texas, United States
© 2026 Stealth Cyber Pty Ltd. ABN 72 675 840 632. All rights reserved.