If a BEC attack is suspected, investigators follow a technical workflow to determine the scope: Business Email Compromise - FBI
: A sudden request to change payment instructions or bank account details for a known vendor is a major indicator. If a BEC attack is suspected, investigators follow
Detecting a BEC attempt requires looking for psychological and technical anomalies: If a BEC attack is suspected