Company context
The client is a $120M revenue distribution company. The CFO's email was compromised through a phishing attack; the attacker observed payment patterns for several weeks, then impersonated a vendor (using a lookalike domain) and redirected a $400K wire payment to a fraudster-controlled account. The company discovered the fraud 11 days later when the actual vendor inquired about the unpaid invoice.
BEC (Business Email Compromise) is the most common large-loss fraud in finance per FBI IC3 statistics — billions in annual losses. The defense pattern is well-known but rarely fully implemented. We were brought in to design the program in 90 days post-incident.
- $120M revenue distribution company
- CFO email compromised via phishing
- Attacker observed payment patterns 6 weeks
- Impersonated vendor with lookalike domain
- $400K wire to fraudster account
- Discovered 11 days later
- Bank fraud claim partial recovery: $280K
- Insurance claim: deductible exceeded loss
Before — what was actually broken
No out-of-band verification on payment changes. Vendor master changes accepted via email. No dual approval on wire payments above threshold. No BEC training. Email security baseline (no MFA on CFO email; no DMARC; no business email gateway).
- No out-of-band verification on payment / vendor changes
- Vendor master changes via email
- Wire approvals via email (no dual control)
- No BEC awareness training
- CFO email without MFA
- No DMARC, SPF, DKIM email authentication
- No business email gateway (Mimecast, Proofpoint)
- No fraud detection on bank wires
What Ledger Summit implemented
A six-track BEC defense program: (1) email security hardening; (2) vendor master controls; (3) payment authorization protocols; (4) out-of-band verification; (5) BEC awareness training; (6) incident response playbook.
- Email security: MFA mandatory; DMARC, SPF, DKIM enforced; business email gateway (Mimecast) deployed
- Vendor master controls: change requests in-system only (no email); dual control on bank detail changes; W-9 + voided check verification on new vendors
- Payment authorization: dual control on all wires above $10K; out-of-band callback for changes above $50K (call vendor at known phone number)
- Out-of-band verification protocol: documented; phone numbers stored in vendor master separate from email
- BEC awareness training: quarterly mandatory training; phishing simulation; CFO and AP team primary focus
- Incident response playbook: detection signal definitions, internal escalation, bank notification, FBI IC3 reporting, legal counsel engagement
- Fraud monitoring: Bank positive pay enabled; large wire alerts; pattern-anomaly detection
- Cyber insurance review: coverage adequacy assessment, deductible vs. expected loss analysis