Falling for the Fake CEO: How Business Email Compromise Tricks Even the Smartest Teams

Falling for the Fake CEO: How Business Email Compromise Tricks Even the Smartest Teams

Authority as the perfect disguise

Picture this. An email pings your inbox. It’s from the Managing Director or Group CEO. Short, urgent, and commanding: “Approve this transfer before noon.” For many Nigerian professionals, that instruction carries immediate weight. In our workplaces, where hierarchy is deeply respected, the instinct to act fast often overshadows the instinct to pause. That is why Business Email Compromise (BEC) is thriving.

BEC doesn’t depend on sophisticated malware. It thrives on psychology. Attackers know that in many Nigerian companies, leadership’s voice is rarely questioned. They exploit that cultural reflex – turning trust in authority into a weapon.

Anatomy of a fake CEO scam

BEC is sometimes called “CEO fraud,” and the label isn’t far from the truth. Attackers spoof an executive’s email or compromise the real account using stolen credentials. Then they send simple, believable messages – often stripped of attachments or logos.

Common tricks Nigerian businesses face include:

  • Wire transfer fraud: Finance teams receive last-minute “urgent” requests for payments, often framed as vendor or contractor settlements.
  • Payroll diversion: HR staff are tricked into rerouting staff salaries to different accounts.
  • Vendor invoice scams: Accounts teams are told to update supplier details, especially with local contractors or government vendors.
  • Data theft: Executives appear to request sensitive employee or customer information, which attackers later use for fraud.

The genius of BEC lies in its simplicity. These emails don’t look suspicious. They blend seamlessly into daily business communication.


Why Nigerian teams fall for it

BEC works not because our professionals lack training, but because attackers exploit how businesses operate here.

  • Hierarchy bias: Nigerian corporate culture often discourages staff from challenging senior leaders.
  • Urgency pressure: Deadlines in procurement or government contract bids are tight, making employees quick to comply.
  • Fear of escalation: Nobody wants to be blamed for slowing down the oga at the top.
  • Isolation: With remote and hybrid work spreading in Lagos, Abuja, and Port Harcourt, in-person confirmations are less frequent.

Ask yourself: if your CFO sends an email at 7:30 a.m. demanding a transfer before 9, would you question it? Or would you process it immediately, afraid of being seen as uncooperative? That’s where BEC lands its strike.


The staggering scale of losses

Globally, BEC is one of the most expensive cybercrimes. The FBI’s Internet Crime Complaint Center recorded over 2.9 billion dollars in losses in 2023. While Nigerian-specific data is harder to come by, the Central Bank of Nigeria and NDIC have repeatedly warned about increasing fraud incidents targeting banks, fintech’s, and even government agencies.

Figure 1: Global BEC Losses by Year (2019–2023)

Two truths stand out:

  1. BEC is not slowing down.
  2. Organizations of every size — from Lagos SMEs to multinationals – are at risk.

Nigerian case studies that resonate

  • West African oil and gas supplier fell victim when attackers, posing as executives, tricked staff into paying false invoices worth hundreds of thousands of dollars.
  • local university nearly lost grant funds after fraudsters redirected disbursement accounts.
  • Several Nigerian SMEs have reported salary diversion scams, where attackers convinced HR teams to change staff payroll accounts.

The message is clear: whether you’re a multinational or a microbank, BEC is a real and present threat.


Warning signs Nigerian teams should watch

Look out for these red flags in emails that appear to come from leadership:

  • Sudden changes in bank account details, especially switching from Nigerian banks to foreign ones.
  • Requests to bypass standard approval processes.
  • Odd spelling of local company names or email domains (e.g., .com.ng replaced with .co).
  • Emails sent at strange times, like midnight or during public holidays.
  • or style that doesn’t match the executive’s usual communication.

Figure 2: Top Red Flags in BEC Emails Reported by Enterprises

When two or more of these signs appear together, staff should be empowered to stop and verify.

 


Technology helps, but culture is the real shield

Tools are vital, but culture is everything. Nigerian organisations should adopt:

  • Multi-factor authentication on executive accounts.
  • SPF, DKIM, and DMARC to detect spoofed domains.
  • Dual approval workflows for transactions above a set threshold.
  • Fraud detection AI tailored to local financial behaviors.

But even the best tools won’t work without cultural change. Staff must feel safe asking, “Oga, are you sure about this request?” Leaders should openly encourage verification, removing fear of insubordination. That mindset shift is the ultimate defense.


Urgency: the trickiest weapon of all

Think of how Nigerian travelers respond when the airline staff calls “final boarding.” Passengers rush, sometimes leaving luggage behind. Urgency bypasses rational thought. That’s exactly why attackers use it. Recognizing urgency as a deliberate tactic helps teams slow down before making mistakes.


The future: AI, voice fraud, and deepfakes

Tomorrow’s BEC will be more convincing. Attackers are already cloning voices of CEOs using AI tools. Imagine receiving a call in your MD’s voice confirming a transfer. Or attending a Zoom meeting where a deepfake executive asks for an urgent favor.

Figure 3: Emerging BEC Techniques: AI Voice, Deepfakes, SMS Spoofing

Nigeria, with its growing fintech and digital banking sector, will be a prime target. The response must be proactive – zero-trust verification, multi-channel approvals, and training staff to expect manipulation.


A resilient Nigerian workflow

Every department has a role:

  • Finance: Never change supplier or contractor bank details without calling a verified contact.
  • HR: Double-check requests for payroll or BVN data.
  • IT: Monitor executive account logins from unusual IP addresses (especially outside Nigeria).
  • Executives: Lead by example, telling teams they are encouraged to verify.

Figure 4: BEC Defense Quick Steps


Closing thought

BEC thrives where respect for hierarchy and urgency collide. In Nigeria, where both carry heavy weight in the workplace, attackers find fertile ground. Breaking their grip requires not only stronger tools but stronger culture.

The smartest defense for Nigerian businesses is to normalize verification. Empower employees to pause, confirm, and challenge – even if the request comes “from the top.”

Because at the end of the day, protecting the company is everyone’s job.