{"id":11194,"date":"2018-08-30T21:00:00","date_gmt":"2018-08-30T21:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/d\/d-id\/1332711"},"modified":"2018-08-30T21:00:00","modified_gmt":"2018-08-30T21:00:00","slug":"whos-at-greatest-risk-for-bec-attacks-not-the-ceo","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/","title":{"rendered":"Who&#8217;s At Greatest Risk for BEC Attacks? Not the CEO"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<header>\n<\/header>\n<p><span class=\"strong black\">CEOs only make up 2.2% of business email compromise targets, a sign most victims are further down the corporate ladder.<\/span> <\/p>\n<p class=\"\">A common misconception in security is that business email compromise (BEC) attacks most frequently target corporate leaders, specifically CEOs and CFOs.<\/p>\n<p>Not the case, according to a new study of 3,000 BEC attacks analyzed by the Barracuda Sentinel Team. These threats, which have been responsible for billions of dollars in fraud losses over the past two years, are slipping past security tools as attackers learn which tactics work best.<\/p>\n<p>Earlier this summer, the FBI <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180712.aspx\" target=\"_blank\">reported<\/a> BEC scams have caused more than $12 billion in domestic and international loss between October 2013 and May 2018. And the threat is growing: between December 2016 and May 2018, there was a 136% increase in reported global exposed losses.<\/p>\n<p>While their techniques may be shifting, BEC attackers&#8217; primary motivation of financial gain remains the same. Barracuda found 46.9% of attacks were created to facilitate a wire transfer; in comparison, less than 1% aim to steal personally identifiable information (PII).<\/p>\n<p>The small percentage of attacks targeting PII are focused on industries like healthcare and education, where organizations have vast stores of user data, explains Asaf Cidon, Barracuda&#8217;s vice president of email security. Even in these incidents, the ultimate goal is financial gain: actors who steal users&#8217; personal data can turn around and sell it on the Dark Web.<\/p>\n<p>But harvesting and selling PII is a more arduous process than getting an employee to wire funds straight into an attacker-controlled account. Cybercriminals want easy access to funds and, as researchers learned, they&#8217;re increasingly proficient at getting targets to do their bidding.<\/p>\n<p><strong>Malicious Emails: No Links, No Problem<\/strong><\/p>\n<p>There are a few ways to go about deceiving employees into sending money. Some threat actors send &#8220;urgent&#8221; requests for specific amounts, assuming the employee will act immediately. Others try to build rapport with their targets before requesting the money transfer.<\/p>\n<p>An important finding \u2013 the most significant, says Cidon \u2013 is fewer of these attacks include malicious links, which are often caught by security filters. Only 40% of BEC messages include links, while 60% do not, instead relying on social engineering techniques to be successful.<\/p>\n<p>&#8220;What attackers realize is there&#8217;s actually a lot of harm you can do in sending an email without any links,&#8221; Cidon explains, adding most plaintext BEC emails request wire transfers. &#8220;They can probably do more damage through impersonation than by using phishing as the main hook.&#8221;<\/p>\n<p>Chris Hadnagy, founder and CEO at Social-Engineer, Inc., says he has noticed attackers get craftier as security technology improves and employees become more security-savvy. However, improved hardware and software has lulled companies into a false sense of security. They think they&#8217;re safe with strong firewalls and IPS, but attackers are changing the game.<\/p>\n<p>He explains the rise of combination attacks in which threat actors will send a plaintext email, sans links, in which they claim to have authority and request a wire transfer. They&#8217;ll follow this up with a phone call: &#8220;Hey, this is Paul, I just sent an email \u2026 can you make that happen?&#8221;<\/p>\n<p>&#8220;The combination of a vishing call with a phishing attack tends to help people believe and trust the attacker more,&#8221; Hadnagy continues. &#8220;The days of sending malware-laden PDFs are gone \u2013 that doesn&#8217;t exist anymore.&#8221;<\/p>\n<p><strong>Prime Targets Have Less Power<\/strong><\/p>\n<p>The most likely targets for BEC attacks have less power than people think, says Cidon, noting that this is &#8220;actually a really big misconception&#8221; in the enterprise. CEOs, CFOs, and other high-level executives are frequently impersonated by attackers, he continues, but they are less frequently hit than the employees who report to them in IT, sales, marketing, operations, etc.<\/p>\n<p>CEOs make up 2.2% of attack recipients but 42.9% of those impersonated, Barracuda <a href=\"https:\/\/blog.barracuda.com\/2018\/08\/30\/threat-spotlight-barracuda-study-of-3000-attacks-reveals-bec-targets-different-departments\/\" target=\"_blank\">researchers found<\/a>. CFOs made up 16.9% of recipients and 2.2% of those impersonated. Finance\/HR made up 16.9% of targets, while &#8220;other&#8221; made up more than half of attack targets.<\/p>\n<p>&#8220;[Attackers] are portraying someone in higher power, whether it&#8217;s the CEO or their secretary, and they&#8217;re attacking those who fear for their jobs from that department,&#8221; Hadnagy explains. The CEO and CFO can question their motives and deny wire transfers. Employees in middle management or below will hesitate to question an authority who makes a request.<\/p>\n<p>&#8220;The point is, the separation has to be far enough that the individual doesn&#8217;t know everyone in that higher level personally,&#8221; he continues. If an attacker claims to work with the CEO and demands an urgent wire transfer, a lower-level employee is more likely to comply.<\/p>\n<p>Threat actors can often find the corporate hierarchy \u2013 and other information they need to launch a BEC attack \u2013 with a simple online search. Employees often put their phone numbers on LinkedIn or business cards; even if they don&#8217;t, there&#8217;s a good chance their colleagues will. It&#8217;s not hard to call someone and ask for their coworker&#8217;s phone number, he points out.<\/p>\n<p>It&#8217;s even easier to seek out an employee&#8217;s email address. Once an actor knows the email format for a company (<a href=\"https:\/\/www.darkreading.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"ff99968d8c8b919e929ad1939e8c8b919e929abf9c90928f9e9186d19c9092\">[email\u00a0protected]<\/a>, for example), they can plug in the name of their desired target.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p><span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/d\/d-id\/1332711?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CEOs only make up 2.2% of business email compromise targets, a sign most victims are further down the corporate ladder. Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/d\/d-id\/1332711?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-11194","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Who&#039;s At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who&#039;s At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-30T21:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Who&#8217;s At Greatest Risk for BEC Attacks? Not the CEO\",\"datePublished\":\"2018-08-30T21:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/\"},\"wordCount\":913,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/\",\"name\":\"Who's At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2018-08-30T21:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who&#8217;s At Greatest Risk for BEC Attacks? Not the CEO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who's At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/","og_locale":"en_US","og_type":"article","og_title":"Who's At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-30T21:00:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Who&#8217;s At Greatest Risk for BEC Attacks? Not the CEO","datePublished":"2018-08-30T21:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/"},"wordCount":913,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/","url":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/","name":"Who's At Greatest Risk for BEC Attacks? Not the CEO 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2018-08-30T21:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whos-at-greatest-risk-for-bec-attacks-not-the-ceo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Who&#8217;s At Greatest Risk for BEC Attacks? Not the CEO"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=11194"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11194\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=11194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=11194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=11194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}