The New Face of Business Email Compromise

Micro-Manipulation Attacks

Business Email Compromise

As an IT and security professional, you probably work with a lot of different suppliers. Things get busy. You’re probably guilty of opening an invoice and clicking to pay without a second thought–as long as it’s from a supplier you trust.

But what happens when that supplier isn’t who they say they are? They’re a bad actor, and instead of your usual invoice, they’ve made one powerful small change–the bank account number. You’ve now paid thousands of dollars to an unknown entity.

What is BEC, and Why is It Harder Than Ever to Detect?

BEC (business email compromise) scams are on the rise. Don’t believe us? In 2024, the FBI reported a massive $55 billion loss from these types of attacks. Increasingly, these attacks use micro-manipulations (like changing an account number) to fool busy working professionals. Turns out that the most dangerous emails are the ones that look exactly as they should, minus one tiny detail.

Traditional BEC attacks have gotten easier to recognize over the years. They’d often have poor grammar and formatting, obvious impersonation attempts, or even generic requests for wire transfers. But now those attacks have gotten significantly more sophisticated, like the invoice manipulation mentioned above or social engineering tricks like a “known” entity reaching out with “updated contact information” (hint: they’re not who they say they are), or even legacy vendor relationship abuse, which includes mining old communications to reference past projects while introducing new malicious payment instructions or contact changes.

The Anatomy of Modern Supplier Fraud 

Let’s break down exactly how these attacks work. In a typical supplier invoice manipulation, attackers don’t just randomly change bank details. They study your vendor relationships first. They gain access to a real supplier’s email account or create a perfect replica of their communication style. The fraudulent invoice matches everything except for those crucial bank routing numbers at the bottom.

Contact information updates work similarly. A casual email arrives from what appears to be a trusted business partner: “Hey there, just wanted to let you know we’ve moved offices and updated our contact details.” No links, no attachments, nothing suspicious. But now all future communications get redirected to the attacker’s infrastructure, setting them up for bigger fraud down the line.

Why These Attacks Succeed 

These types of micro changes work because employees are simply busy. They don’t always give emails or invoices the care that they require. Employees also put trust in familiar communication patterns. If something seems “normal,” it probably is, right? Not always. Finally, it can be difficult for even the most eagle-eyed employees to notice single-variable changes, like one or two numbers in an account number. That type of investigation requires a lot of time and effort.

Training employees to spot obvious phishing emails has become standard practice. But micro-manipulation attacks exploit the exact opposite—they look so normal that trained employees let their guard down. When everything appears correct except for one small detail, cognitive overload kicks in. This is where the real danger lies. These attacks don’t trigger the “something seems off” instinct that employees have been trained to recognize. Instead, they exploit trust and routine business processes.

Traditional email security tools focused on obvious red flags, like suspicious words or phrases, strange hyperlinks, or unknown attachments. New schemes prey on human cognitive biases that ignore those small micro-changes. It’s no longer about content first and foremost; it’s about context.

Moving Beyond Surface-Level Analysis

Semantic intent detection focuses on what suspicious actors are trying to accomplish–not what they write. This approach maps normal business communication flows—understanding that procurement discussions follow predictable patterns, vendor relationships have established protocols, and executive requests maintain consistent contextual frameworks. When a “trusted supplier” suddenly introduces new payment instructions without proper business justification, semantic analysis flags this behavior regardless of formatting or branding familiarity.

As BEC attacks grow increasingly sophisticated through micro-manipulation tactics, intent-aware security solutions are a must-have for protecting business communications and financial assets. 

If you’re ready to assess your organization’s BEC risk profile and explore semantic AI integration, get in touch. We’ll help your systems understand context, so you can do what you do best.