CEO Email Impersonation Whaling Scam
Verdict: Suspicious | Risk Score: 9/10 | Severity: critical
Category: UPI
How CEO Email Impersonation Whaling Scam Works
Overview The CEO Email Impersonation Whaling Scam targets executives, finance teams, or HR personnel at Indian companies. Fraudsters carefully impersonate top leadership through spoofed emails and pressure victims to urgently transfer large sums or share confidential data. This scam is dangerous because it can cause massive financial losses in just a few hours. How It Works Attackers begin by studying LinkedIn profiles, corporate press releases, and public social media about your company's leadership. They identify recent business events (like mergers, funding rounds, or leadership changes) to craft believable emails. Using lookalike email address[ADDRESS_REDACTED]itive. Many times, the message contains specific details (past deals, references to real projects) to appear genuine. When the victim follows instructions and transfers funds, the money is quickly moved to overseas or fraudulent bank accounts, making recovery difficult. India Angle In India, such attacks often occur during financial year end, board meetings, or management changes, when companies are naturally under pressure. Attackers spoof Indian CEO names, reference landmark Indian business events, and demand payments via IMPS, RTGS, or UPI to accounts held in Indian public or private sector banks. Metro areas like Mumbai, Bengaluru, Gurugram, Hyderabad, and Pune are prime targets due to high corporate density. Real Examples - "Hi, this is Sunita Mehra, your CEO. Due to urgent business with our Singapore partner, process a transfer of Rs 50 lakh today. This is confidential – respond only to this email." - "As discussed in this morning's board call, transfer Rs 1 crore to the attached account for the acquisition. Keep this between us." Red Flags - Unexpected urgent payment instructions referencing confidentiality or secrecy - Weird sender address[ADDRESS_REDACTED].com" instead of official domain) - Vague reasons for payments, or references to unfamiliar projects - Requests to bypass normal finance workflows - Unusual writing style or language errors Protective Measures - Always confirm large wire requests by calling the executive on their official company line - Never rely on just emails—follow dual-authorization for any transfer above defined limits - Alert your IT or cybersecurity team about suspicious messages instantly - Educate staff regularly about whaling and impersonation risks If Victimised - Immediately contact your bank to try and stop or recall the payment - Lodge a complaint with the nearest cyber cell or call 1930 - Report the case at cybercrime.gov.in and inform the RBI - Share evidence but do not delete any suspicious emails Related Scams - Vendor email compromise fraud - HR payroll redirection scams - Business email compromise (BEC) targeting SMEs
Visual Intelligence:
BharatSecure's AI has identified this as a used in scams targeting Indian users.
Who Does CEO Email Impersonation Whaling Scam Target?
General public across India
Red Flags — How to Identify CEO Email Impersonation Whaling Scam
- Urgent requests for funds with secrecy
- Slightly altered executive email addresses
- Bypassing usual payment channels
- Pressure to act immediately
- References to unfamiliar deals
What To Do If You Encounter CEO Email Impersonation Whaling Scam
- Do not click any links or share personal information
- Block and report the sender immediately
- Report at cybercrime.gov.in or call 1930
- Inform your bank if financial details were shared
How to Report CEO Email Impersonation Whaling Scam in India
- Call 1930 — National Cyber Crime Helpline (24x7)
- File a complaint at cybercrime.gov.in
- Contact your bank immediately if money was lost
- Call RBI helpline: 14440 for banking fraud
Frequently Asked Questions
- What is CEO Email Impersonation Whaling Scam?
- Overview The CEO Email Impersonation Whaling Scam targets executives, finance teams, or HR personnel at Indian companies. Fraudsters carefully impersonate top leadership through spoofed emails and pressure victims to urgently transfer large sums or share confidential data. This scam is dangerous because it can cause massive financial losses in just a few hours. How It Works Attackers begin by studying LinkedIn profiles, corporate press releases, and public social media about your company's lead
- How does CEO Email Impersonation Whaling Scam work?
- Overview The CEO Email Impersonation Whaling Scam targets executives, finance teams, or HR personnel at Indian companies. Fraudsters carefully impersonate top leadership through spoofed emails and pressure victims to urgently transfer large sums or share confidential data. This scam is dangerous because it can cause massive financial losses in just a few hours. How It Works Attackers begin by stu
- How to protect yourself from CEO Email Impersonation Whaling Scam?
- Do not click any links or share personal information Block and report the sender immediately Report at cybercrime.gov.in or call 1930 Inform your bank if financial details were shared
- How to report CEO Email Impersonation Whaling Scam in India?
- Report to cybercrime.gov.in or call 1930 (National Cyber Crime Helpline). You can also contact your local police station's cyber cell.
Verify Any Suspicious Message
Check any suspicious message, link, or call for free at bharatsecure.app. BharatSecure uses AI to detect scams in real-time and protect Indian users.