CEO Fraud Attacks: All You Need to Know

Using a fake email to trick employees into fraudulent money transfers is a relatively simple way to rob a company with unsuspecting staff members. This tactic is also highly efficient—the FBI attributes more than $26 billion worth of losses to CEO fraud, which makes these attacks the highest-grossing type of cybercrime.

This article is a complete guide to CEO fraud that goes into all you need to know about this cyber threat. We explain how these attacks happen, go into different scam strategies, offer prevention tips (both for employees and C-level executives), and show what to do if you become a victim of CEO fraud.

Guide to CEO fraud attack

What Is CEO Fraud?

CEO fraud is a type of scam in which a criminal uses email to impersonate an executive and fool a lower-ranking employee into performing an unauthorized wire transfer. The scammer pretends to be someone with the power to ask workers to make payments, such as the CEO, COO, CFO, or Head of HR.

A CEO fraud email does not always ask for a direct money transfer. A criminal can also order an employee to:

CEO fraud caused $2.4 billion in losses to US businesses in 2021, equating to a third of the year's total cybercrime costs. Here's why these attacks are so effective:

While the $26 billion figure is frightening, the actual all-time cost of CEO fraud is likely higher. Many attacks go unreported as organizations often decide not to report scams that cost them small amounts of money.

Do not confuse CEO fraud with whaling, a phishing attack in which a scammer targets—rather than impersonates—a company executive.

How Does CEO Fraud Happen?

Every CEO fraud starts with extensive research. The attacker gathers identity details for (at least) two individuals:

The attacker researches employees by:

The research phase sometimes lasts for weeks or even months while the scammer devises a plan. Once criminals spot a perfect opportunity, they approach the target via an email with a "fitting" request. Some common tactics are:

Criminals use various tactics to fool employees, pretending to be executives, vendors, lawyers, etc. Most scams use urgency to pressure the recipient, like in this example:

Example of a CEO fraud email

Scammers did their homework in this imaginary example:

Attackers rely on various techniques to gather the necessary info and pull off CEO fraud. Let's look at the most common ones.

Domain Spoofing

Spoofing an email means creating an email name almost identical to the address of the person you are trying to impersonate. Typically, the criminal alters the domain name slightly to mimic the corporate email (such as using "[email protected]" instead of "[email protected]").

The goal is to create a lookalike domain that causes visual confusion. If the recipient is not careful, these little changes easily go unnoticed.

Spoofed emails help an attacker perform research before launching a CEO fraud, but this technique also often enables a criminal to pull off the attack. If the scammer cannot hack or gain access to a legitimate email (which is a considerably more challenging approach), they will use a spoofed email to contact their target.

Planning for spoofed domains is only a small part of keeping business emails safe. Learn what else you must account for in our article on email security best practices.

Phishing

Scammers send phishing emails to employees to "fish out" sensitive info by posing as legit sources, such as:

Phishing helps a scammer to gather helpful intel for the upcoming CEO fraud. Alternatively, the phishing email can contain malware that infects the system and enables the criminal to hack the email account. The scammer then uses the address to either launch an attack or dig deeper into the organization.

If the phishing campaign succeeds, an intruder gains access to company accounts, calendars, hierarchy, and other data that gives the details needed to carry out the scheme.

Learn about different types of phishing attacks and see what your team should do to keep the business safe.

Spear Phishing

Whereas regular phishing campaigns target multiple users, spear phishing goes after one specific employee. The criminal uses this calculated attack to mislead the employee with a personalized storyline and either:

If a criminal manages to hijack an executive's account, there is no longer a need to use a spoofed email. The intruder then tricks employees by using the actual address, giving an apparent legitimacy to any request.

Email Account Compromise

Phishing is not the only method of hacking someone's email account. A scammer looking to pull off a CEO fraud can also get email credentials from:

Once scammers get their hands on an email account, they start sending credible scam messages to employees. They also get access to all previous emails, enabling hackers to analyze how the manager communicates and imitate their tone of voice or incorporate commonly used catchphrases.

Our guide to strong passwords explains how to create credentials that are easy to remember and impossible to brute-force.

How CEO fraud works

Who Is at Greatest Risk of Being the Target of CEO Fraud?

Cybersecurity studies suggest that almost 77% of CEO frauds involve employees outside financial or executive roles, so "building a wall" around staff members who authorize money transfers is not a sufficient defense.

Organizations of all sizes will experience CEO fraud attempts at some point. Many times have CEO fraud attackers tried to fraud phoenixNAP employees by impersonating Ron Cadwell, the CEO and founder of phoenixNAP. That's why employee education should be the top priority of any organization.

Every employee is a potential victim of CEO fraud, either as the final target or a means to an end during attack setup. Here are employee groups considered valuable targets given their roles and access to funds or info:

Did you know that an average corporation experiences over 700 social engineering attacks every year? Learn how to protect your organization in our social engineering prevention article.

Examples of CEO Fraud

Let's take a look at a few of the biggest CEO frauds to help you get a sense of how these scams happen:

Once cybercriminals make their way into your system, CEO fraud is not the only thing to worry about. A data breach is another likely scenario, which is just as dangerous to your bottom line.

Red flags of a phishing email

CEO Fraud Prevention

Below are the most effective methods for countering the threat of CEO fraud.

Tips for companies

Tips for individual employees

CEO fraud relies on human mistakes to succeed. Organize regular cybersecurity awareness training to ensure the staff knows how to recognize online threats.

How to Report CEO Fraud?

Here's a step-by-step instruction on what to do if you've been a victim of CEO fraud:

1. Contact your bank ASAP

2. Contact attorneys

3. Reach out to law enforcement

4. Brief your senior management

5. Conduct IT forensics

Unfortunately, companies recover less than 4% of fraudulently transferred funds. Consider taking out an insurance policy that covers you in case of CEO fraud (typically regarded as coverage for internal negligence or email impersonation, not as cyber security insurance)

Are Your Employees Ready for CEO Fraud Attempts?

No one solution guarantees 100% protection against CEO fraud. You must rely on a mix of technologies, employee awareness, and sound internal policies to combat this threat effectively. You also require an incident response plan to ensure the team is ready to react to a scam attempt. Otherwise, you risk getting caught off guard, which is a sure-fire recipe for suffering losses from CEO fraud.