{"id":15499,"date":"2018-10-11T19:30:01","date_gmt":"2018-10-11T19:30:01","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542136"},"modified":"2018-10-11T19:30:01","modified_gmt":"2018-10-11T19:30:01","slug":"the-bec-list-helping-thwart-business-email-compromise-through-collaboration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/","title":{"rendered":"The BEC List: Helping Thwart Business Email Compromise through Collaboration"},"content":{"rendered":"<div class=\"post-text\" readability=\"66.797004991681\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M<sup>3<\/sup>AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List.<\/p>\n<p>The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The <a href=\"https:\/\/www.m3aawg.org\/events\/jd-falk-award\">JD Falk Award<\/a> is given to individuals or groups whose meritorious work has helped protect online users and organizations.<\/p>\n<p>We commend the organizations, along with the threat and security researchers and analysts who were an instrumental part of the BEC List. Trend Micro is proud to be part of it as one of the first members at its inception in 2015. Our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/delving-into-the-world-of-business-email-compromise-bec\">extensive research<\/a> on BEC \u2014 from keyloggers such as <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercrime-to-cyberspying-limitless-keylogger-and-predator-pain\">Predator Pain<\/a>, <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/not-limitless-trend-micro-ftr-assists-arrest-limitless-author\/\">Limitless<\/a>, and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/hawkeye-nigerian-cybercriminals-used-simple-keylogger-to-prey-on-smbs\">Hawkeye<\/a> to the <a href=\"https:\/\/documents.trendmicro.com\/assets\/TrackingTrendsinBusinessEmailCompromise.pdf\">various email and social engineering tricks<\/a> used in BEC \u2014 is a reflection of our commitment to making the world safe for the exchange of digital information.<\/p>\n<h2><strong>Why tackle BEC?<\/strong><\/h2>\n<p>Online scams are a recurring pain point for users and enterprises. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/business-email-compromise-(bec)\">BEC fraud<\/a> in particular has accounted for over <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180525.aspx\">$12.5 billion<\/a> in global losses since 2013, according to the FBI. Its operators use malware \u2014 many of which are bought in <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/west-african-underground\">underground marketplaces<\/a> \u2014 social engineering, or a combination of both to access and hijack systems or trick victims into wiring money into an account the cybercriminal controls. Our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">further research<\/a> into BEC also revealed a steady increase in BEC-related attempts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-542137\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec.png\" alt=\"\" width=\"314\" height=\"385\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec.png 314w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec-245x300.png 245w\" sizes=\"auto, (max-width: 314px) 100vw, 314px\"\/><\/p>\n<p><em>Figure 1: Half-year comparison of recorded BEC attempts<\/em><\/p>\n<p><em>Note: Data refers to the number of BEC attempts seen, which does not indicate whether the attacks were successful. BEC samples consist mainly of CEO fraud (attackers posing as CEO\/executive).<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-542140\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples.png\" alt=\"\" width=\"520\" height=\"300\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples.png 520w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-300x173.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-440x254.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-380x219.png 380w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\"\/><\/p>\n<p><em>Figure 2: Malware samples used in BEC attacks from January 2017 to September 2017 based on VirusTotal samples<\/em><\/p>\n<p>The number of perpetrators and the scope of their crime require a combined effort between individuals and organizations across the cybersecurity community to help thwart threats like BEC.<\/p>\n<p>Previous recipients of the JD Falk Award were involved in various takedowns that required significant coordination and knowledge sharing such as the <a href=\"https:\/\/youtu.be\/4QZofCIA9eQ\">Avalanche takedown<\/a> \u00a0in <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/avalanche-thwarting-cybercriminal-hazards-with-law-enforcement-collaboration\/\">December 2016<\/a> and <a href=\"https:\/\/youtu.be\/OQk_hA1v2D8?list=PLbmNODesqn-j8OcmwaTh05gHKaF8JvUSz\">DNS Changer Working Group<\/a> in <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/esthost-taken-down-biggest-cybercriminal-takedown-in-history\/\">November 2011<\/a>.<\/p>\n<p>We are honored to be recognized by the M<sup>3<\/sup>AAWG with this award. Our efforts to stop cybercriminals from successful BEC attacks \u2013 and all cybercrime \u2013 will continue.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has&#8230;<br \/>\nThe post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":15500,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[328,375,311,550,3939],"class_list":["post-15499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-bec","tag-business","tag-current-news","tag-cybercrime","tag-spotlight"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-11T19:30:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The BEC List: Helping Thwart Business Email Compromise through Collaboration\",\"datePublished\":\"2018-10-11T19:30:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/\"},\"wordCount\":379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg\",\"keywords\":[\"BEC\",\"Business\",\"Current News\",\"Cybercrime\",\"Spotlight\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/\",\"name\":\"The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg\",\"datePublished\":\"2018-10-11T19:30:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BEC\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/bec\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The BEC List: Helping Thwart Business Email Compromise through Collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-11T19:30:01+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The BEC List: Helping Thwart Business Email Compromise through Collaboration","datePublished":"2018-10-11T19:30:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/"},"wordCount":379,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg","keywords":["BEC","Business","Current News","Cybercrime","Spotlight"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/","url":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/","name":"The BEC List: Helping Thwart Business Email Compromise through Collaboration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg","datePublished":"2018-10-11T19:30:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BEC","item":"https:\/\/www.threatshub.org\/blog\/tag\/bec\/"},{"@type":"ListItem","position":3,"name":"The BEC List: Helping Thwart Business Email Compromise through Collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/15499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=15499"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/15499\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/15500"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=15499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=15499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=15499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}