The threat of Business Email Compromise in US healthcare

Executive summary: Business Email Compromise is siphoning billions from U.S. healthcare by exploiting human trust instead of software flaws. Spoofed or hijacked messages authorize fraudulent payments, spark ransomware, and expose patient data—causing crippling financial, operational, and compliance damage. Deploying DMARC, MFA, and rigorous multi-person payment checks is now critical.

3 key takeaways

  • Healthcare’s BEC exposure is acute and costly: High invoice volumes, hectic clinical workflows, and reliance on email let scammers siphon millions while average detection takes 308 days.
  • The attack chain is low-tech but sophisticated: Reconnaissance, look-alike domains, thread hijacking, and psychological ploys create urgent, “authoritative” requests that bypass many legacy controls.
  • Layered controls—people, process, technology—are non-negotiable: Enforcing DMARC (p = reject), MFA, dual-approval payment workflows, and ongoing phishing drills, augmented by XDR and behavioral analytics, markedly reduces risk.

Business Email Compromise (BEC) now ranks among the most costly and deceptive cyber-threats facing the US healthcare sector, siphoning off billions of dollars every year. Unlike traditional phishing campaigns that rely on malicious links or attachments, BEC hinges on social-engineering tactics that exploit human behaviour instead of code or software flaws.

In January, the Health Sector Cybersecurity Coordination Center (HC3) highlighted BEC as a top risk because it slips past many legacy email-security controls and inflicts severe financial and operational pain. The FBI’s Internet Crime Complaint Center (IC3) reports that, between 2013 and 2023, BEC scams drained more than $55 billion globally—with healthcare organizations squarely in attackers’ sights.

What is BEC and how does it work? 

BEC attacks unfold through a disciplined, phased approach. Threat actors first map the organization’s email culture, financial workflows, and personnel hierarchies, then strike when they see an opening. The table below shows a typical playbook:

Step
Description
Common Tactics Used
Research and Reconnaissance
Cybercriminals conduct extensive intelligence gathering on the organization’s internal processes, key personnel, and communication style.
• Scrape company websites and directories for names and roles 
• Mine social media (LinkedIn, X, Facebook) for job moves, vacations, and partnerships 
• Review press releases and financial filings to spot vendors, upcoming payments, or acquisitions 
• Buy stolen credentials on the dark web to crack corporate mailboxes 
• Craft convincing pretexts
Email Spoofing and Domain Manipulation
Attackers create fake email accounts or compromise real ones to mimic legitimate communications.
• Register near-identical look-alike domains (e.g., @healthcareqroup.com vs. @healthcaregroup.com) 
• Send fraudulent messages from compromised internal accounts 
• Hijack existing threads so requests seem authentic
Social Engineering and Psychological Manipulation
Instead of relying on malware, attackers use psychological tactics to create a sense of urgency, authority, and confidentiality.
• Impersonate executives (CEO, CFO) to press employees for swift payments 
• Spoof vendors and issue fake invoices 
• Pose as legal or payroll staff to request tax forms or reroute salaries 
• Demand “confidential” action under pressure of a sensitive deal or emergency
Execution and Financial Fraud
Attackers convince victims to send money or disclose sensitive information, leading to fraudulent transactions or data theft.
• Direct wire transfers to attacker-controlled accounts—often offshore 
• Leverage stolen credentials to plant ransomware or launch broader fraud 
• Divert payroll deposits to criminal accounts 
• Exfiltrate patient or financial data for resale on dark-net markets

By the time teams spot the fraud, the funds have often vanished having been wired overseas or converted to cryptocurrency. IBM estimates organizations need roughly 308 days on average to detect and contain a BEC incident. This blend of stealth, low tech, and high reward keeps BEC at the top of healthcare-cybersecurity cost charts.

Why is the healthcare sector a prime target?

Healthcare organizations handle high-value transactions—vendor payments, payroll, medical-supply purchases—all of which tempt attackers. Email drives everything from patient records to billing and vendor coordination, and more than 75% of attacks still originate in the inbox. Stolen credentials unlock both financial and sensitive patient data, while hectic clinical environments can nudge employees to approve urgent requests without double-checking. Those ingredients make healthcare an ideal hunting ground for BEC actors.

The impact of BEC on critical infrastructure

  1. Financial losses
    • Fraudulent transfers routinely drain millions.
    • Average losses per incident trend higher than in other industries because healthcare deals with large invoices and slower detection.

  2. Operational disruptions
    • Compromised mailboxes often serve as launchpads for ransomware that halts clinical operations.
    • Fake vendor payments delay equipment deliveries and jeopardize procedures.
    • Billing fraud snarls revenue cycles and payroll.

  3. Regulatory and compliance risks
    • A single BEC incident can trigger HIPAA violations if attackers touch patient data.
    • Proposed 2025 HIPAA updates tighten cybersecurity accountability, requiring proof of preventive controls.
    • Standards bodies (PCI DSS 4.0.1, MITRE ATT&CK, CISA, NIST) flag email-auth protocols—DMARC, SPF, DKIM—as baseline defenses.

  4. Reputational harm and patient trust
    • Public confidence plummets when attackers leak sensitive medical information.
    • Lawsuits from patients, partners, or investors frequently follow high-profile breaches.

  5. Human costs
    • Sixty-six percent of healthcare firms hit by BEC report care disruptions; 2023 Ponemon data tied these incidents to a 50 percent rise in complications and a 23 percent uptick in patient mortality.
    BEC isn’t merely a cybersecurity concern—it’s a business-continuity and patient-safety imperative.

Combating BEC in healthcare

Healthcare leaders need a defense-in-depth strategy that marries email security, workforce readiness, financial safeguards, and incident-response rigor. A robust roadmap looks like this:

Strategy
Key actions
Strengthen Email Security and Authentication
• Deploy DMARC, SPF, and DKIM to block spoofing
• Leverage AI-driven tools that flag sender-behavior anomalies
• Disable unauthorized auto-forwarding to external accounts
Enforce Strong Identity and Access Controls
• Require Multi-Factor Authentication (MFA)
• Adopt Zero-Trust principles for continuous validation
• Restrict high-risk transactions to pre-approved staff with dual sign-off
Conduct Regular Cybersecurity Awareness Training
• Teach staff to spot urgency cues, emotional manipulation, and subtle email changes
• Run simulated BEC phishing drills and track improvements
Establish Robust Payment Verification and Approval Policies
• Mandate multi-person approvals above set dollar thresholds
• Validate payment-change requests via a known phone number
• Shift from email-based approvals to secure payment platforms
Improve Incident Response and Reporting
• Freeze suspect payments immediately, launch forensics, and notify regulators
• File reports with the FBI IC3 and HHS cybersecurity teams
• Debrief post-incident to strengthen controls and training
Invest in Advanced Security Technologies
• Roll out Extended Detection and Response (XDR) to watch email, endpoints, and cloud channels
• Apply behavioral analytics to flag abnormal financial moves before money leaves the door

Having the right tools is mission-critical—starting with DMARC. When you configure DMARC at a p=reject policy, you keep impostor emails out while letting legitimate traffic flow, shielding employees, patients, and supply-chain partners. A leading solution like Red Sift OnDMARC streamlines deployment and ongoing monitoring, helping organizations regain control of domains that sit beyond their firewall.

A call to action for healthcare organizations

BEC is a people-process-technology problem, not just an IT glitch. Attackers continuously refine their playbooks and now wield AI to craft even more convincing pretexts. Healthcare organizations cannot wait for the next breach headline.


By hardening email defenses (DMARC included), sharpening employee instincts, enforcing airtight payment checks, and adopting modern threat-detection platforms, healthcare leaders can outmaneuver BEC scammers. Act today to prevent painful recovery and costly mistakes.

Chat to the Red Sift team and find out how we can best support your organization to stay secure.

PUBLISHED BY

Jack Lilley

29 May. 2025

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Product Release

Red Sift’s 2025 Spring Quarterly Product Release

Francesca Rünger-Field

This Spring, we’ve delivered targeted updates to improve compliance, simplify certificate management, and strengthen infrastructure visibility—so you can take action faster and with more confidence. Highlights include: OnDMARC BIMI: Now with full Digicert & CMC support OnDMARC customers that wish to improve trust in their emails and boost open rates by implementing BIMI through…

Read more
BEC

The threat of Business Email Compromise in US healthcare

Jack Lilley

Executive summary: Business Email Compromise is siphoning billions from U.S. healthcare by exploiting human trust instead of software flaws. Spoofed or hijacked messages authorize fraudulent payments, spark ransomware, and expose patient data—causing crippling financial, operational, and compliance damage. Deploying DMARC, MFA, and rigorous multi-person payment checks is now critical. 3 key takeaways Business Email…

Read more
Email

Cloudflare selects Red Sift as a preferred partner to provide DMARC and…

Rebecca Warren

AI-generated email attacks are rapidly growing in scale and sophistication, demanding stronger defenses from at-risk organizations. Starting today, Red Sift is excited to announce a new strategic partnership with Cloudflare, the leading connectivity cloud company, to deliver its market-leading email security application, Red Sift OnDMARC, to a broader global audience.  Today’s alignment enhances Cloudflare’s…

Read more
Cybersecurity

New Zealand moves to mandate DMARC enforcement

Jack Lilley

Executive summary: New Zealand’s Secure Government Email Framework mandates DMARC at p=reject—plus hard-fail SPF, universal DKIM, enforced MTA-STS, and TLS-RPT—by October 2025. The rules replace SEEMail, curb soaring phishing losses, and will affect every organization that emails the public sector. Key takeaways: The New Zealand Government has recently published the Secure Government Email (SGE) Common…

Read more