{"id":3225,"date":"2025-05-12T07:18:17","date_gmt":"2025-05-12T06:18:17","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=3225"},"modified":"2025-05-12T07:18:17","modified_gmt":"2025-05-12T06:18:17","slug":"unrelenting-business-email-compromise-trends-despite-decrease-in-cyber-claims","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/unrelenting-business-email-compromise-trends-despite-decrease-in-cyber-claims\/","title":{"rendered":"Unrelenting Business Email Compromise Trends Despite Decrease in Cyber Claims"},"content":{"rendered":"<p><h1>Despite Drop in Cyber Claims, BEC Keeps Going Strong<\/h1>\n<p>In 2024, cyber claims, specifically those pertaining to ransomware, stabilized while there was an uptick in business email compromise (BEC) attacks.<\/p>\n<p>This conveys a critical message to cybersecurity professionals and businesses alike: BEC remains a significant and escalating threat. <\/p>\n<h2>Understanding BEC<\/h2>\n<p>Business Email Compromise (BEC) entails the unauthorized access and fraudulent use of a genuine email account to commit financial fraud and data theft.<\/p>\n<p>This trend reached a new peak in 2024 despite efforts in stymieing ransomware, as reported by insurance provider Coalition.<\/p>\n<h2>Data and Statistics<\/h2>\n<p>Coalition&#8217;s year-end report indicates that 60% of total cyber claims in 2024 were related to BEC and funds transfer fraud (FTF).<\/p>\n<p>Furthermore, among these BEC incidents, consultants found that 29% concluded with FTF.<\/p>\n<p>Interestingly, BEC claims severity saw a 23% year-over-year rise to an average loss of $35,000 per case.<\/p>\n<p>This increase is mainly attributed to a significant spike in cases in the second half of 2024.<\/p>\n<h2>Exploring the Challenges<\/h2>\n<p>BEC attacks pose various challenges to business security.<\/p>\n<p>They often convincingly impersonate high-level executives or trusted partners, leading employees to perform actions such as transferring funds.<\/p>\n<p>The increased sophistication of these attacks makes them difficult to detect using traditional security systems. <\/p>\n<h2>Recommendations<\/h2>\n<p>Protecting against BEC attacks requires a layered approach.<\/p>\n<p>Enterprises should prioritize user education, implement resilient email security infrastructure, encourage the use of secure payment procedures, and enforce strict information sharing policies.<\/p>\n<p>It&#8217;s also crucial to establish a risk management strategy that involves regular system audits and protocol reviews.<\/p>\n<h2>Conclusion<\/h2>\n<p>Despite the stabilization of overall cyber claims \u2014 including those from ransomware attacks \u2014 BEC attacks remain an escalating and significant cybersecurity threat.<\/p>\n<p>Organizations must hold dialogue with their cybersecurity partners and invest in setting up resilient infrastructure to protect against this growing menace.<\/p>\n<h2>Follow-Up Reading<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2025\/05\/24\/businesses-bec-attacks\/\">Inside the Mind of a BEC Cybercriminal: Tactics, Techniques, and Procedures<\/a><\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2025\/06\/13\/businesses-ransomware-claims\/\">How to Safeguard your Business from BEC Attack<\/a><\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2025\/07\/08\/cybersecurity-threat-landscape\/\">The Cybersecurity Threat Landscape: Trends and Predictions<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Despite Drop in Cyber Claims, BEC Keeps Going Strong In 2024, cyber claims, specifically those<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-3225","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=3225"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3225\/revisions"}],"predecessor-version":[{"id":3229,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3225\/revisions\/3229"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=3225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=3225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=3225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}