Who: The FBI's IC3 is the primary place to report BEC.
When to use: Use when someone used a compromised or fake email to request funds or data.
What to prepare:
- Email headers
- Bank/transfer details
- Recipient info
Go to IC3~10 min
Category: Online & communication
Always confirm wire transfers and sensitive requests through a separate, known channel—call the real person on a number you already have—before sending anything.
The CFO gets an email that looks like it’s from the CEO: “I need you to wire $50,000 to this account today—confidential deal.” The wire goes out before anyone double-checks. The CEO’s email was spoofed or hacked; the money has already landed in an account controlled by scammers, often overseas. By the time the bank is contacted, the funds are moved again. Business email compromise exploits trust and urgency; recovery is rare.
Common red flags: pressure to act immediately, requests for payment by gift card or wire, offers that seem too good to be true, or unsolicited requests for your personal or financial details.
BEC scams use hacked or spoofed business or personal email to trick you into sending wire transfers or sensitive data to fraudsters. Report to the FBI IC3 with full details.
Who: The FBI's IC3 is the primary place to report BEC.
When to use: Use when someone used a compromised or fake email to request funds or data.
What to prepare:
Go to IC3~10 min
Who: The FTC also accepts reports of business-related fraud.
When to use: Use to report the scam in addition to IC3.
What to prepare:
FTC ReportFraud~5 min