Business Email Compromise Statistics
Business Email Compromise by Industry
Latest Statistics
In Q4 2025, Business Email Compromise accounted for 51% of all email fraud cases.
Diversion tactics (fraudulent invoices, fake payroll requests) accounted for 18% of BEC incidents in Q4 2025.
In Q4 2025, CEOs and senior executives accounted for 50% of impersonation-based BEC emails and 41% of total BEC incidents.
Impersonation made up 82% of all BEC incidents in Q4 2025.
Business Email Compromise (BEC) accounted for 21% of successful cyber attacks, surpassing ransomware at 16%.
31% of leaders at financial services firms say they are unprepared to recover effectively from a Business Email Compromise.
In 2022, 64% of respondents from healthcare organizations said their organizations were very or highly vulnerable to BEC/spoofing/impersonation attacks.
52% of healthcare organizations were vulnerable or highly vulnerable to a BEC/spoofing/impersonation incident in 2024.
53% of healthcare organizations believe their organizations are vulnerable or highly vulnerable to a BEC/spoofing/impersonation incident.
56% of organizations noted preparedness for business email compromise.
Swedish and Norwegian targets comprise a combined 19% of BEC targets.
After CEOs and executives, the remaining BEC impersonation efforts are aimed at directors and managers (9%), HR personnel (4%), IT staff (3%), and school heads (2%).
The strategic use of Danish language in BEC scams is 11.9%.
A significant portion of BEC targets are Danish, at 38%.
Swedish language use in BEC scams is 3.8%.
For Business Email Compromise (BEC) attacks, English-speaking executives remain the most targeted at 42%.
Norwegian language use in BEC scams is 1.5%.
Impersonation is the most common technique in BEC scams, with 82% of attempts targeting CEOs and executives.
Non-Business Email Compromise (BEC) incidents rose by 214%.
Conversely, EMEA organisations show the highest reporting rate for BEC, at 4.22%
Repeat engagement with VEC in EMEA is the highest of any region, over twice that of BEC.
Email-based BEC attacks surged 70% year-over-year.
The majority of 2024 cyber insurance claims (60%) originated from business email compromise (BEC) and funds transfer fraud (FTF) incidents.
29% of BEC events resulted in funds transfer fraud in 2024.
BEC claims severity increased by 23% in 2024.
The FBI received 21,442 complaints about business email compromise scams in 2024 (versus 21,489 in 2023 and 21,832 in 2022).
Business email compromise (BEC) remained the No. 1 avenue for attempted and actual payments fraud in 2024, cited by 63% of respondents.
Wire transfers were the payment method most frequently targeted by BEC scammers in 2024, reported by 63% of respondents, up from 39% in the previous survey.
Spoof emails were the most prevalent type of BEC, cited by 79% of respondents.
ACH credits saw more BEC scam activity in 2024 than in the prior year, rising to 50% from 47% of respondents reporting incidents.
Third-party impersonations, reported by 63% of respondents, remained the most frequent type of BEC scam.
"Classic" BEC scams, saw a significant decline, with 49% of respondents reporting incidents in 2024 compared to 57% in 2023.