The attacker compromises or imitates an e-mail account, claims to be a partner, vendor or employee, and sends apparently legitimate payment instructions. They normally ask for an urgent payment, change of IBAN, an “update” of vendor’s details or a payment to a “newly opened account” which is, of course, fake.
They often use very similar domains (e.g. @company.com.hr instead of @company.hr), make “minor” errors such as mixed up letters (@frim.hr instead of @firm.hr) or use visually similar but technically different symbols and typosquatting (e.g. “I” instead of “l” in the case of paypaI.com or “corn” instead of “com” – for example, cornpany.com), which make it difficult to detect the scam.
Always make independent verification via telephone or official internal channels, especially if the matter involves urgency or change in a vendor’s details. Carefully examine the sender’s domain – only one different letter can mean that the account is fraudulent. Always abide by the 4-eyes rule or use multiple authorizations for all outgoing payments. Use MFA (multifactor authentication) to access e-mail systems and provide your employees with social engineering education on a regular basis.

How to identify and prevent