In 2024, a logistics company in Batu Pahat suffered a shocking financial loss — over RM321,000 siphoned away in a matter of days. The culprit? A cleverly disguised Business Email Compromise (BEC) scam tricked an employee into wiring money to an overseas account.

This incident is an advanced email-based cyber fraud that isn’t slowing down, and it can happen to any business, anywhere, at any time.

How did it happen?

According to Batu Pahat District Deputy Police Chief Supt. Shahrulanuar Mushaddat Abdullah Sani, the attack began when the company received an email from what appeared to be an overseas vendor. The email notified of a change in banking details and requested payment of RM448,215.11 for container rental.

Believing the message was authentic, the company’s employee transferred the funds without any questions or verification. When the employee tried to contact the actual vendor to verify the payment and was denied, it was already too late. The employee discovered the email address had been spoofed. While the company scrambled to stop the transaction, only RM122,709.76 was recoverable.

What Is Business Email Compromise (BEC)?

BEC is one of the most dangerous and costly cyber threats today. Here’s how it works:

  • Cybercriminals impersonate a trusted entity (supplier, CEO, partner)
  • They use a lookalike email address with minor character changes
  • They create urgency, often requesting wire transfers or sensitive data
  • The recipient, under pressure, complies without a second thought

These scams are highly targeted, incredibly convincing, and often slip through even with spam filters and antivirus software in place.

Why This Case Matters

This wasn’t a tech failure. It was a human failure enabled by social engineering. The attacker didn’t break into a system. They broke into trust.

And the financial loss isn’t the only issue. These attacks can result in:

  • Legal complications
  • Reputational damage
  • Business operation delays
  • Internal mistrust or blame

If it can happen to a logistics company handling international transactions, it can happen to any organisation.

Our advice

1. Verify Before You Pay

If a supplier suddenly provides a new bank account, pause. Call the company using known contact details and confirm the request verbally. Never rely on email alone.

2. Train All Financial and Procurement Staff

These are the most targeted roles in any company. Run BEC awareness sessions, simulate scams, and instil a culture of don’t trust, always verify.

3. Use Email Authentication Protocols

Set up SPF, DKIM, and DMARC to filter out forged messages before they hit your employees’ inboxes.

4. Create Multi-Layered Approval for Payments

Especially for high-value transactions, ensure dual authorisation is mandatory. One person should never control the full flow of funds.

5. Audit Your Security Posture Regularly

Engage in penetration testing, simulate phishing and BEC scenarios, and close any weak points before attackers find them.

Final Thoughts

Business Email Compromise is stealthy, persuasive, and financially devastating. The only way to stay ahead is to get proactive about cybersecurity. Don’t wait until your finance team receives that fake email. Let’s make sure they know how to spot it and stop it.



At Condition Zebra, we protect businesses like yours from cyber threats:

  • Cybersecurity Online & Physical Training
  • Security Awareness Training
  • Vulnerability Assessments and Penetration Testing (VAPT)
  • Managed Detection and Response (MDR)

Contact Condition Zebra today for a free consultation with our Cybersecurity Expert


Source:

Logistics company loses over RM300,000 to BEC scam