Business Email Compromise Vendor Impersonation

Verdict: Suspicious | Risk Score: 9/10 | Severity: critical

Category: UPI, WhatsApp

How Business Email Compromise Vendor Impersonation Works

Overview: Business Email Compromise (BEC) Vendor Impersonation is a growing threat hitting Indian companies, especially those with frequent vendor payments. Fraudsters hack or mimic legitimate vendor email address[ADDRESS_REDACTED]raudulent. Victims transfer funds to accounts controlled by criminals, leading to major financial losses and straining vendor relationships. How It Works: 1. Hackers either compromise a real vendor’s email account or create a lookalike domain (e.g., swapping an 'o' with a zero). 2. Finance departments receive an email, often at month-end, requesting payment for a real invoice but with updated payment instructions. 3. The message is marked 'urgent' or 'confidential,' and may avoid usual approval processes. 4. If questioned, fraudsters may follow up via WhatsApp using spoofed numbers or pose as senior executives authorising the transaction. 5. Payments go to mule accounts and are rapidly dispersed before detection. India Angle: This scam is rampant across urban centres like Bengaluru, Mumbai, Delhi, and Chennai, where large volumes of B2B payments occur. Cases spike during financial closings, when finance teams are under pressure. Indian corporates using email and WhatsApp for vendor communication are particularly at risk. Real Examples: - A finance manager in Gurgaon receives an email from '[UPI_REDACTED].co.in' (note the zero), claiming the company’s bank details have changed for urgent GST settlement. - A purchase officer in Chennai gets a WhatsApp message from a spoofed number, mirroring a vendor’s profile photo, asking for immediate transfer citing delayed delivery penalties. Red Flags: - Any request to change existing bank details mid-transaction with urgency. - Small spelling mistakes or slightly different vendor email addresses. - Payment instructions via general email domains like Gmail or Yahoo. - Requests bypassing standard financial controls or requiring secrecy. Protective Measures: - Never act on bank detail changes communicated solely via email or WhatsApp—always confirm via a trusted phone number or face-to-face. - Use two-factor authentication for all business email accounts. - Train all staff to spot suspicious emails and verify domain details closely. - Implement approval workflows that require verification for any change in payment details. If Victimised: - Contact your bank immediately to try to recall the transaction. - Report the incident to 1930 and cybercrime.gov.in. - Notify your genuine vendor and investigate all other pending payments. - Audit recent communications for other signs of compromise. Related Scams: - Fake ERP Login Page Attacks - CEO Email Fraud - WhatsApp Profile Name Spoofing Schemes

Visual Intelligence:

BharatSecure's AI has identified this as a used in scams targeting Indian users.

Who Does Business Email Compromise Vendor Impersonation Target?

General public across India

Red Flags — How to Identify Business Email Compromise Vendor Impersonation

  • Email requests to change bank account details unexpectedly
  • Slightly altered vendor email address[ADDRESS_REDACTED]
  • Urgent or confidential payment instructions, especially at month-end
  • Use of free email providers instead of official domains
  • Attempts to bypass usual payment approvals

What To Do If You Encounter Business Email Compromise Vendor Impersonation

  1. Do not click any links or share personal information
  2. Block and report the sender immediately
  3. Report at cybercrime.gov.in or call 1930
  4. Inform your bank if financial details were shared

How to Report Business Email Compromise Vendor Impersonation in India

  • Call 1930 — National Cyber Crime Helpline (24x7)
  • File a complaint at cybercrime.gov.in
  • Contact your bank immediately if money was lost
  • Call RBI helpline: 14440 for banking fraud

Frequently Asked Questions

What is Business Email Compromise Vendor Impersonation?
Overview: Business Email Compromise (BEC) Vendor Impersonation is a growing threat hitting Indian companies, especially those with frequent vendor payments. Fraudsters hack or mimic legitimate vendor email address[ADDRESS_REDACTED]raudulent. Victims transfer funds to accounts controlled by criminals, leading to major financial losses and straining vendor relationships. How It Works: 1. Hackers either compromise a real vendor’s email account or create a lookalike domain (e.g., swapping an 'o' wi
How does Business Email Compromise Vendor Impersonation work?
Overview: Business Email Compromise (BEC) Vendor Impersonation is a growing threat hitting Indian companies, especially those with frequent vendor payments. Fraudsters hack or mimic legitimate vendor email address[ADDRESS_REDACTED]raudulent. Victims transfer funds to accounts controlled by criminals, leading to major financial losses and straining vendor relationships. How It Works: 1. Hackers ei
How to protect yourself from Business Email Compromise Vendor Impersonation?
Do not click any links or share personal information Block and report the sender immediately Report at cybercrime.gov.in or call 1930 Inform your bank if financial details were shared
How to report Business Email Compromise Vendor Impersonation in India?
Report to cybercrime.gov.in or call 1930 (National Cyber Crime Helpline). You can also contact your local police station's cyber cell.

Verify Any Suspicious Message

Check any suspicious message, link, or call for free at bharatsecure.app. BharatSecure uses AI to detect scams in real-time and protect Indian users.