Skip to article
Security Alert
Emergent Story mode

Now reading

Overview

1 / 5 3 min 3 sources Single Outlet
Sources

Story mode

Security AlertSingle OutletBlindspot: Single outlet risk

Business Email Compromise Scams Evolve, Cost Billions

Sophisticated attacks exploit human trust, with Lazarus Group using new Medusa ransomware

Read
3 min
Sources
3 sources
Domains
1

Business email compromise (BEC) scams have become a major concern for companies worldwide, with the FBI reporting that these attacks have cost businesses over $43 billion globally between 2016 and 2022. Unlike...

Story state
Structured developing story
Evidence
Evidence mapped
Coverage
0 reporting sections
Next focus
What comes next

Continue in the field

Focused storyNearby context

Open the live map from this story.

Carry this article into the map as a focused origin point, then widen into nearby reporting.

Leave the article stream and continue in live map mode with this story pinned as your origin point.

  • Open the map already centered on this story.
  • See what nearby reporting is clustering around the same geography.
  • Jump back to the article whenever you want the original thread.
Open live map mode

Source bench

Blindspot: Single outlet risk

Single Outlet

3 cited references across 1 linked domains.

References
3
Domains
1

3 cited references across 1 linked domain. Blindspot watch: Single outlet risk.

  1. Source 1 · Fulqrum Sources

    How to prevent business email compromise

  2. Source 2 · Fulqrum Sources

    Know the red flags: Business email compromise signs to look out for

Open source workbench

Keep reporting

ContradictionsEvent arcNarrative drift

Open the deeper evidence boards.

Take the mobile reel into contradictions, event arcs, narrative drift, and the full source workspace.

  • Scan the cited sources and coverage bench first.
  • Keep a blindspot watch on Single outlet risk.
  • Move from the summary into the full evidence boards.
Open evidence boards

Stay in the reporting trail

Open the evidence boards, source bench, and related analysis.

Jump from the app-style read into the deeper workbench without losing your place in the story.

Open source workbenchBack to Security Alert
🔒 Security Alert

Business Email Compromise Scams Evolve, Cost Billions

Sophisticated attacks exploit human trust, with Lazarus Group using new Medusa ransomware

Tuesday, February 24, 2026 • 3 min read • 3 source references

  • 3 min read
  • 3 source references

Business email compromise (BEC) scams have become a major concern for companies worldwide, with the FBI reporting that these attacks have cost businesses over $43 billion globally between 2016 and 2022. Unlike traditional phishing attacks that rely on malware or infected attachments, BEC scams use social engineering tactics to trick victims into wiring money or handing over sensitive data.

According to experts, BEC attackers do their homework, studying the target company's accounts payable workflow, scraping LinkedIn profiles, and spoofing vendor domains to create convincing emails that appear to come from trusted suppliers or executives. These emails are often well-crafted and may even be inserted into existing email conversations, making them difficult to detect.

One of the latest threats in the BEC landscape is the Lazarus Group, a North Korean threat group that has been using a new type of ransomware called Medusa. In addition to Medusa, the group has also leveraged other tools, including the Comebacker backdoor, Blindingcan RAT, and info stealer Infohook, in its recent attacks.

So, how can companies prevent BEC scams? The key is to be aware of the red flags. These may include sudden requests for payments or changes to payment instructions, emails that appear to come from executives or suppliers but have slight variations in the sender's email address, or requests for sensitive information or login credentials.

To prevent BEC scams, companies should implement a combination of technical and non-technical controls. These may include:

  • Verifying the authenticity of emails, especially those that request payments or sensitive information
  • Implementing two-factor authentication for email and other critical systems
  • Conducting regular security awareness training for employees
  • Monitoring email traffic for suspicious activity
  • Implementing a robust incident response plan in case of a BEC attack

In addition, companies should also be aware of the tactics used by BEC attackers, including the use of social engineering tactics to create a sense of urgency or trust. By being aware of these tactics and taking steps to prevent BEC scams, companies can reduce the risk of falling victim to these costly attacks.

In the case of the Lazarus Group's Medusa ransomware, companies should be on high alert for any suspicious activity related to this malware. This may include monitoring for unusual network activity, implementing robust backup and disaster recovery procedures, and having a plan in place for responding to a ransomware attack.

In conclusion, BEC scams are a major concern for companies worldwide, with the potential to cost billions of dollars in losses. By being aware of the red flags and taking steps to prevent these scams, companies can reduce the risk of falling victim to these attacks. Staying vigilant and up-to-date on the latest threats, including the Lazarus Group's Medusa ransomware, is critical in the fight against BEC scams.

Sources:

  • "How to prevent business email compromise"
  • "Know the red flags: Business email compromise signs to look out for"
  • "Lazarus Group Picks a New Poison: Medusa Ransomware"

Business email compromise (BEC) scams have become a major concern for companies worldwide, with the FBI reporting that these attacks have cost businesses over $43 billion globally between 2016 and 2022. Unlike traditional phishing attacks that rely on malware or infected attachments, BEC scams use social engineering tactics to trick victims into wiring money or handing over sensitive data.

According to experts, BEC attackers do their homework, studying the target company's accounts payable workflow, scraping LinkedIn profiles, and spoofing vendor domains to create convincing emails that appear to come from trusted suppliers or executives. These emails are often well-crafted and may even be inserted into existing email conversations, making them difficult to detect.

One of the latest threats in the BEC landscape is the Lazarus Group, a North Korean threat group that has been using a new type of ransomware called Medusa. In addition to Medusa, the group has also leveraged other tools, including the Comebacker backdoor, Blindingcan RAT, and info stealer Infohook, in its recent attacks.

So, how can companies prevent BEC scams? The key is to be aware of the red flags. These may include sudden requests for payments or changes to payment instructions, emails that appear to come from executives or suppliers but have slight variations in the sender's email address, or requests for sensitive information or login credentials.

To prevent BEC scams, companies should implement a combination of technical and non-technical controls. These may include:

  • Verifying the authenticity of emails, especially those that request payments or sensitive information
  • Implementing two-factor authentication for email and other critical systems
  • Conducting regular security awareness training for employees
  • Monitoring email traffic for suspicious activity
  • Implementing a robust incident response plan in case of a BEC attack

In addition, companies should also be aware of the tactics used by BEC attackers, including the use of social engineering tactics to create a sense of urgency or trust. By being aware of these tactics and taking steps to prevent BEC scams, companies can reduce the risk of falling victim to these costly attacks.

In the case of the Lazarus Group's Medusa ransomware, companies should be on high alert for any suspicious activity related to this malware. This may include monitoring for unusual network activity, implementing robust backup and disaster recovery procedures, and having a plan in place for responding to a ransomware attack.

In conclusion, BEC scams are a major concern for companies worldwide, with the potential to cost billions of dollars in losses. By being aware of the red flags and taking steps to prevent these scams, companies can reduce the risk of falling victim to these attacks. Staying vigilant and up-to-date on the latest threats, including the Lazarus Group's Medusa ransomware, is critical in the fight against BEC scams.

Sources:

  • "How to prevent business email compromise"
  • "Know the red flags: Business email compromise signs to look out for"
  • "Lazarus Group Picks a New Poison: Medusa Ransomware"

Coverage tools

Sources, context, and related analysis

Visual reasoning

How this briefing, its evidence bench, and the next verification path fit together

A server-rendered QWIKR board that keeps the article legible while showing the logic of the current read, the attached source bench, and the next high-value reporting move.

Cited sources

0

Reasoning nodes

3

Routed paths

2

Next checks

1

Reasoning map

From briefing to evidence to next verification move

SSR · qwikr-flow

Story geography

Where this reporting sits on the map

Use the map-native view to understand what is happening near this story and what adjacent reporting is clustering around the same geography.

Geo context
0.00° N · 0.00° E Mapped story

This story is geotagged, but the nearby reporting bench is still warming up.

Continue in live map mode

Coverage at a Glance

3 sources

Compare coverage, inspect perspective spread, and open primary references side by side.

Linked Sources

2

Distinct Outlets

1

Viewpoint Center

Not enough mapped outlets

Outlet Diversity

Very Narrow
0 sources with viewpoint mapping 0 higher-credibility sources 1 reference without direct URL
Coverage is still narrow. Treat this as an early map and cross-check additional primary reporting.

Coverage Gaps to Watch

  • Single-outlet dependency

    Coverage currently traces back to one domain. Add independent outlets before drawing firm conclusions.

  • Thin mapped perspectives

    Most sources do not have mapped perspective data yet, so viewpoint spread is still uncertain.

  • No high-credibility anchors

    No source in this set reaches the high-credibility threshold. Cross-check with stronger primary reporting.

Read Across More Angles

Source-by-Source View

Search by outlet or domain, then filter by credibility, viewpoint mapping, or the most-cited lane.

Showing 2 of 2 cited sources with links.

1 citation-only reference will appear once direct links are available.

Unmapped Perspective (2)

csoonline.com

How to prevent business email compromise

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Know the red flags: Business email compromise signs to look out for

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
Fact-checked Real-time synthesis Bias-reduced

This article was synthesized by Fulqrum AI from 3 trusted sources, combining multiple perspectives into a comprehensive summary. All source references are listed below.