{"id":28122,"date":"2025-09-02T12:16:35","date_gmt":"2025-09-02T10:16:35","guid":{"rendered":"https:\/\/perseus.de\/in-focus-business-email-compromise\/"},"modified":"2026-03-31T14:32:57","modified_gmt":"2026-03-31T12:32:57","slug":"in-focus-business-email-compromise","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/","title":{"rendered":"In Focus: Business Email Compromise"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28122\" class=\"elementor elementor-28122 elementor-24926\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In Focus: Business Email Compromise<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Business email compromise is a targeted form of digital fraud in which attackers exploit internal business processes through manipulated or compromised email communication. The goal is to redirect payments, steal sensitive data or manipulate processes.   <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"384\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-768x384.jpeg\" class=\"attachment-medium_large size-medium_large wp-image-28120\" alt=\"An email appears on a screen that could have potentially malicious content or has been manipulated by cybercriminals.\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-768x384.jpeg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-300x150.jpeg 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-1024x512.jpeg 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-1536x768.jpeg 1536w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-2048x1024.jpeg 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Source: Rawf8 via Adobe Stock<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"color: #ffffff; font-family: Poppins, sans-serif;\" data-start=\"141\" data-end=\"167\">Due to current events<\/h4><p style=\"font-size: 16px;\" data-start=\"169\" data-end=\"663\">Small and medium-sized companies in particular are increasingly affected by the compromise of their e-mail communication. Our incident response management team also deals with attacks of this kind almost every day. Now, nearly half of all cases reported to 24\/7 emergency response are business email compromise (BEC). Our case study shows how attackers proceed in concrete terms \u2013 and what steps you can take immediately to better protect your company.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a91556 e-flex e-con-boxed e-con e-parent\" data-id=\"4a91556\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c1881d0 e-con-full e-flex e-con e-child\" data-id=\"c1881d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6cad134 e-con-full e-flex e-con e-child\" data-id=\"6cad134\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4f8151 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b4f8151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"623\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-1024x797.png\" class=\"attachment-large size-large wp-image-28121\" alt=\"Manm sits at the laptop and works and receives a warning.\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-1024x797.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-300x234.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-768x598.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-1536x1196.png 1536w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/Case-Study_BEC-Allgemein-via-Adobe-Stock-2048x1595.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: Eakrin via Adobe Stock<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940521b elementor-widget elementor-widget-text-editor\" data-id=\"940521b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>A case from practice<\/h4><p>A medium-sized company commissioned an IT service company to set up new servers. After completion of the project, the accounting department received a detailed final invoice by e-mail and transferred the required amount to the specified account. <\/p><p>A few weeks later, however, the IT company contacted him and asked why the bill had not yet been paid. The subsequent audit showed that the real invoice had never arrived \u2013 instead, the accounting department had paid on the basis of a fake e-mail in which the account data had been manipulated. <\/p><p>The forensic analysis revealed that attackers had previously gained access to an employee&#8217;s Microsoft 365 account via a phishing email. With the compromised account, they were able to read email traffic in Outlook, monitor communication with the IT company and thus create a deceptively real-looking fake invoice. They forwarded these to the accounting department \u2013 provided with false payment information.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f2d18b e-flex e-con-boxed e-con e-parent\" data-id=\"8f2d18b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a58566c elementor-widget elementor-widget-text-editor\" data-id=\"a58566c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Find out in our case study how criminals proceed with business email compromise \u2013 and what measures will protect your company in the future.<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Download the case study to learn:\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\">\n<li>How did the attackers proceed in concrete terms?<\/li>\n<li>What were the consequences for the parties involved?<\/li>\n<li>What tips do our experts give companies that are affected by attacks of this kind?<\/li>\n<li>What measures should be taken to prevent these attacks?<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<link rel=\"stylesheet\" href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins&amp;&amp;display=swap\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #041e42;  \">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  The input could not be saved. Please try again. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  We have received your request. Please check your email inbox and verify your email address to receive the guide. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:540px; border-radius:1px; border-width:1px; border-color:#a8aab8; border-style:solid; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAANsyw__bjgKZcZ2Df_CZ-txn1wqEw0k_nRbKT2oTIc2gTmnOWHNk_yKyete3MBlPpdJ4dEdBMPbuxot2BMeiCefwKcRUdBEXt13gFnXBzNXS7ql5Pn03coS1uvfVx428cpCJIOt6AZVNFOeWQhD0NUQLW1UqcwT2qwJKNwDm3N-l_DSFmRiWOZ8Jkb9NfLeUYHO8NcbR6Cq\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:32px; text-align:left; font-weight:700; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <p>Download case study<\/p>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:16px; text-align:left; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <div class=\"sib-text-form-block\">\r\n              <p>Simply enter your e-mail address and you will receive the case study by e-mail.<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 700; text-align:left; font-size:16px; text-align:left; font-weight:700; font-family:Helvetica, sans-serif; color:#041e42;\" for=\"EMAIL\" data-required=\"*\">E-mail address<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" placeholder=\"Please enter  \" data-required=\"true\" required=\"\">\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-optin sib-form-block\" data-required=\"true\">\r\n            <div class=\"form__entry entry_mcq\">\r\n              <div class=\"form__label-row \">\r\n                <div class=\"entry__choice\" style=\"\">\r\n                  <label>\r\n                    <input type=\"checkbox\" class=\"input_replaced\" value=\"1\" id=\"OPT_IN\" name=\"OPT_IN\" required=\"\">\r\n                    <span class=\"checkbox checkbox_tick_positive\" style=\"margin-left:\"><\/span><span style=\"font-size:12px; text-align:left; font-family:Poppins, webFonts; color:#3C4858; background-color:transparent;\"><p>Data protection is important to us. We use your information to contact you about relevant content and services. You can unsubscribe from any communication at any time. More information www.perseus.de\/datenschutzerklaerung\/.   <\/p><span data-required=\"*\" style=\"display: inline;\" class=\"entry__label entry__label_optin\"><\/span><\/span> <\/label>\r\n                <\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n              <label class=\"entry__specification\" style=\"font-size:12px; text-align:left; font-family:Helvetica, sans-serif; color:#a8aab8; text-align:left\">\r\n  You can unsubscribe from the newsletter at any time via the link in our newsletter.\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-captcha sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <script>\r\n                  function handleCaptchaResponse() {\r\n                    var event = new Event('captchaChange');\r\n                    document.getElementById('sib-captcha').dispatchEvent(event);\r\n                  }\r\n                <\/script>\r\n                <div class=\"g-recaptcha sib-visible-recaptcha\" id=\"sib-captcha\" data-sitekey=\"6Lc3MhopAAAAAAwNvz5u5sHSIiH0DmaVt2IPBWkg\" data-callback=\"handleCaptchaResponse\" style=\"direction:ltr\"><\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: center\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" style=\"font-size:16px; text-align:center; font-weight:700; font-family:Helvetica, sans-serif; color:#FFFFFF; background-color:#041e42; border-radius:15px; border-width:0px;\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewbox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\"\/>\r\n              <\/svg>\r\n  SUBMIT\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'W\u00e4hle bitte einen L\u00e4ndervorwahl aus.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"Dieses Feld darf nicht leer sein. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n\r\n\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<script src=\"https:\/\/www.google.com\/recaptcha\/api.js?hl=de\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form -->\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Business email compromise is a targeted form of digital fraud in which attackers exploit internal business processes through manipulated or compromised email communication. The goal is to redirect payments, steal sensitive data or manipulate processes.   <\/p>\n","protected":false},"author":3,"featured_media":28120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-28122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In Focus: Business Email Compromise - Perseus Technologies<\/title>\n<meta name=\"description\" content=\"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In Focus: Business Email Compromise - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T10:16:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:32:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"In Focus: Business Email Compromise\",\"datePublished\":\"2025-09-02T10:16:35+00:00\",\"dateModified\":\"2026-03-31T12:32:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/\"},\"wordCount\":445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/AdobeStock_353488084-scaled.jpeg\",\"articleSection\":[\"Case Studies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/\",\"name\":\"In Focus: Business Email Compromise - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/AdobeStock_353488084-scaled.jpeg\",\"datePublished\":\"2025-09-02T10:16:35+00:00\",\"dateModified\":\"2026-03-31T12:32:57+00:00\",\"description\":\"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/AdobeStock_353488084-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/AdobeStock_353488084-scaled.jpeg\",\"width\":2560,\"height\":1280,\"caption\":\"Email notification concept, a new email in the inbox, envelope with incoming message on the screen of a laptop, background with office table. 3D illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-business-email-compromise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In Focus: Business Email Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In Focus: Business Email Compromise - Perseus Technologies","description":"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/","og_locale":"en_US","og_type":"article","og_title":"In Focus: Business Email Compromise - Perseus Technologies","og_description":"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.","og_url":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/","og_site_name":"Perseus Technologies","article_published_time":"2025-09-02T10:16:35+00:00","article_modified_time":"2026-03-31T12:32:57+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"In Focus: Business Email Compromise","datePublished":"2025-09-02T10:16:35+00:00","dateModified":"2026-03-31T12:32:57+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/"},"wordCount":445,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg","articleSection":["Case Studies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/","url":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/","name":"In Focus: Business Email Compromise - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg","datePublished":"2025-09-02T10:16:35+00:00","dateModified":"2026-03-31T12:32:57+00:00","description":"Find out in the case study how companies became victims of business email compromise \u2013 and which defensive measures are crucial.","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/AdobeStock_353488084-scaled.jpeg","width":2560,"height":1280,"caption":"Email notification concept, a new email in the inbox, envelope with incoming message on the screen of a laptop, background with office table. 3D illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/in-focus-business-email-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"In Focus: Business Email Compromise"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=28122"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28122\/revisions"}],"predecessor-version":[{"id":28123,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28122\/revisions\/28123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/28120"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=28122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=28122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=28122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}