Business Email Compromise (BEC) in Hong Kong: Prevention Guide

BEC is the highest-value cybercrime category globally and a persistent threat to Hong Kong businesses. Fake payment instructions, supplier impersonation, and CEO fraud cause millions in losses annually — and most are preventable with the right controls.

Business Email Compromise BEC fraud Hong Kong illustration
1What Is BEC

What Is Business Email Compromise and How Does It Target Hong Kong Businesses?

Business Email Compromise (BEC) is a category of fraud in which attackers impersonate trusted parties in a business email exchange to redirect payments or extract sensitive information. Unlike opportunistic mass phishing, BEC attacks are researched and targeted: attackers understand the target organisation's payment processes, supplier relationships, and internal approval chains before launching the attack. BEC consistently tops the FBI's Internet Crime Complaint Center reports as the highest-loss cybercrime category globally, and it is among the most significant cyber threats to Hong Hong Kong Businesses: Implementation Guide">for Hong Kong Online Banking: What You Need to Know">for Hong Kong Online Banking: A Complete Guide">for Hong Kong SMEs: Where to Start">for Hong Kong Businesses">Kong businesses, particularly those in finance, trading, real estate, and professional services where large-value transactions are routine.

BEC attacks exploit the assumption that an email from a known sender can be trusted. In reality, email sender addresses can be spoofed, email accounts can be compromised, and lookalike domains can be registered that differ from the genuine domain by a single character. A finance controller receiving what appears to be an email from their CEO, their bank, or their major supplier requesting a payment change has no reliable way to verify the sender through the email itself — only out-of-band verification (a phone call to a known number) provides real assurance. This fundamental weakness of email-based business processes is what BEC exploits.

Hong Kong's position as a regional financial hub makes its businesses particularly attractive targets. The city hosts a large number of multinational companies' regional treasury and finance functions, conducts significant cross-border transactions with mainland China and Southeast Asia, and has a business culture where email-based payment instructions from senior management are common. The combination of high-value transactions, cross-border complexity, and established email-based processes creates ideal conditions for BEC attackers who focus on financial targets with the largest potential payoffs.

  • Targeted fraud: Researched, targeted attacks on specific payment processes — not mass phishing
  • Email trust exploitation: Exploits the assumed trustworthiness of known sender email addresses
  • Spoofing and compromise: Sender addresses spoofed or genuine accounts compromised — both enable convincing fraud
  • Highest-loss category: BEC tops global cybercrime loss rankings consistently — large individual transactions make HK high-value
  • HK exposure sectors: Finance, trading, real estate, professional services — large-value cross-border transactions
  • Regional treasury risk: Multinational regional finance functions in HK are high-value BEC targets
How targeted spear phishing research enables BEC →
Business Email Compromise mechanism Hong Kong businesses
2BEC Attack Types

The Main Types of BEC Attack Targeting Hong Kong Companies

CEO fraud — also called whaling when the attacker impersonates the CEO — involves an email apparently from a senior executive to a finance or accounting employee, requesting an urgent, confidential wire transfer. The pretext is typically a time-sensitive business opportunity (an acquisition, a regulatory settlement, a confidential deal) that cannot be disclosed to others and must be executed outside normal approval processes. The urgency and confidentiality request are both manipulative elements: urgency prevents careful reflection, and confidentiality prevents the victim from consulting colleagues who might notice the irregularity. In Hong Kong, CEO fraud has resulted in multi-million dollar losses in documented cases involving both local and multinational companies.

Supplier and vendor payment diversion is a second major BEC type. The attacker impersonates a known supplier — using a spoofed or compromised email address — and notifies the target company that their banking details have changed, requesting that future payments be directed to a new account. If the company processes the instruction without out-of-band verification, subsequent legitimate invoice payments are redirected to the attacker. This attack type is particularly effective in Hong Kong's trade finance environment, where payment instructions from overseas suppliers are common and may not trigger the same verification scrutiny as domestic transactions. The fraud may not be detected until the genuine supplier chases payment, by which time multiple transactions may have been redirected.

Account compromise-based BEC is the most technically sophisticated variant: the attacker gains actual access to a legitimate business email account and monitors conversations over time, learning payment patterns, supplier relationships, and upcoming transactions. When a large payment is expected, the attacker inserts fraudulent payment instruction changes at the appropriate moment in an active email thread — appearing to be a genuine continuation of an established conversation. Because the email comes from a real, compromised account rather than a spoofed one, it passes all technical security checks. Detection requires noticing subtle changes in account behaviour or transaction pattern anomalies rather than email technical indicators.

  • CEO fraud: Urgent confidential payment request from apparent senior executive — bypasses normal approval process
  • Supplier payment diversion: Fake banking detail change notification — subsequent legitimate invoices redirected to attacker
  • Account compromise BEC: Real compromised account used to insert payment instruction changes in live email threads
  • Confidentiality instruction: "Keep this confidential" removes the colleague check that would likely detect the fraud
  • Trade finance vulnerability: Overseas payment instructions less scrutinised — high BEC risk in HK trading companies
  • Delayed detection: Fraud may not surface until genuine supplier chases payment — multiple transactions redirected by then
How to detect email spoofing in BEC attacks →
BEC attack types CEO fraud supplier payment change Hong Kong
3Prevention Controls

BEC Prevention Controls for Hong Kong Businesses

The single most effective BEC prevention control is out-of-band verification for any payment instruction changes or unusual financial requests. This means calling the requestor on a previously known, verified phone number — not a number provided in the email — to confirm the instruction before processing. This control must be applied uniformly, including for apparent requests from the CEO, the CFO, or other senior figures whose authority employees are reluctant to question. The social pressure to comply with apparent senior management requests without verification is exactly what CEO fraud exploits; the protocol must explicitly state that out-of-band verification applies to all unusual payment requests regardless of apparent seniority of the requestor.

Dual-authorisation requirements for wire transfers above a threshold significantly limit the damage from successful BEC attacks. If two people must independently approve any transfer above HK$100,000, a single compromised account or deceived employee cannot complete the fraud alone. Supplement this with callback verification for any changes to existing payee banking details — any notification, however apparently routine, that a supplier or partner has changed their account number should trigger a call to the supplier on a number taken from your existing records (not from the email), confirming the change before it is processed. Real banking detail changes do happen; the protocol is not to refuse them but to verify them through a channel independent of the requesting email.

Technical controls include implementing DMARC, DKIM, and SPF on all corporate email domains to prevent external parties from spoofing your organisation's domain in attacks on your partners and customers. Enable email security features that flag external emails that appear to come from internal addresses — these catch a common technique where attackers use a display name matching an executive's name but with an external sending address. Multi-factor authentication on all corporate email accounts prevents account compromise-based BEC by making it significantly harder for attackers to gain persistent access to a monitored inbox even if credentials are phished.

  • Out-of-band verification: Call on a known number for all payment instruction changes — non-negotiable regardless of apparent sender
  • Dual-authorisation threshold: Two independent approvals for transfers above a defined threshold
  • Banking detail change protocol: Always call supplier on existing records to verify before processing any account change notification
  • DMARC/DKIM/SPF: Prevents spoofing of your domain in attacks on your business partners
  • External sender flagging: Email security rules flagging external addresses with internal display names
  • MFA on all email accounts: Prevents account compromise used in the most technically sophisticated BEC variant
The social engineering principles behind CEO fraud →
BEC prevention controls dual authorisation verification Hong Kong
4Incident Response

BEC Incident Response: What to Do If Your Business Is Defrauded

If you discover a BEC fraud immediately after a wire transfer has been initiated, the most urgent action is to contact your bank's corporate fraud team directly and request an immediate recall of the transfer. International wire transfers processed through SWIFT have a finite processing window during which recall requests can intercept the payment before it is credited to the receiving account. This window varies by transaction route and may be as short as a few hours for some international transfers. Do not wait to investigate fully before making this call — contact your bank immediately and gather evidence simultaneously.

Report to the HKPF Cyber Security and Technology Crime Bureau at 182 388 as soon as possible, and contact the Anti-Deception Coordination Centre at 18222 — the ADCC has relationships with both Hong Kong and international banks that can facilitate emergency transaction holds in some circumstances. File a formal police report, as this documentation is required for civil recovery actions, insurance claims, and any regulatory notifications that may be required under your industry's rules. If the receiving bank account is in Hong Kong, the HKPF may be able to apply for a court-ordered freeze of the account more rapidly than if funds have already been forwarded abroad.

Conduct a post-incident investigation to determine how the attack succeeded and prevent recurrence. Examine email headers of the fraudulent message to determine whether it was a spoofed domain attack or whether a genuine account was compromised. If an account was compromised, change credentials, revoke sessions, enable MFA, and check the account's inbox rules — attackers frequently create email rules to forward copies of correspondence and delete fraud-related replies. Review your BEC prevention controls against the attack vector that succeeded and implement additional verification steps. Consider engaging a cybersecurity consultancy to conduct a full assessment of your email security posture and payment control environment.

  • Immediate bank contact: Request transfer recall immediately — processing window is narrow and time-critical
  • HKPF 182 388: Cyber Security and Technology Crime Bureau — report immediately for potential account freeze
  • ADCC 18222: Anti-Deception Coordination Centre — international bank relationships for emergency holds
  • Formal police report: Required for civil recovery, insurance, and regulatory notification
  • Check for account compromise: Examine email headers, review inbox rules, change credentials and enable MFA
  • Post-incident review: Identify the attack vector and implement the control that would have prevented it
Full guide to reporting cyber fraud in Hong Kong →
BEC incident response reporting Hong Kong HKPF ADCC

Out-of-Band Verification Stops BEC — Call Before You Pay

No single control is more effective against BEC fraud than requiring a phone call verification to a known number before processing any payment instruction change or unusual financial request.

Related VPN Articles