Next, scammers start researching the target organization and its activities to determine the employees who will receive the phishing emails, and the identities of the senders the scammers will spoof (impersonate).
BEC scams typically target mid-level employees—e.g., finance department or human resource (HR) managers—who have authority to issue payments or who have access to sensitive data, and who are inclined to comply with such requests from a senior manager or executive. Some BEC attacks may target new employees who may have little or no security awareness training and limited understanding of proper payment or data-sharing procedures and approvals.
For a sender identity, scammers choose a coworker or associate who can credibly request or influence the action the scammer wants the target employee to take. Coworker identities are typically high-level managers, executives or lawyers within the organization.
Outside identities can be executives from vendor or partner organizations, but they might also be peers or colleagues of the employee target—for example, a vendor the employee target works with regularly, a lawyer advising on a transaction, or an existing or new customer.
Many scammers use the same lead-generation tools that legitimate marketing and sales professionals use—LinkedIn and other social media networks, business and industry news sources, prospecting and list-building software—to find potential employee targets and matching sender identities.