Attack spotlight

Fake invoice used to conduct $16,800 BEC attempt

June 26, 2024

Fake invoice used to conduct $16,800 BEC attempt

Sublime Security Attack Spotlight: Attempts to conduct fraud by soliciting a payment for a seemingly legitimate overdue invoice.

Ready to see Sublime 
in action
Get a demo
Authors
Threat Detection Team
Threat Detection Team
Sublime

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected.

EMAIL PROVIDER: Microsoft 365, Google Workspace

ATTACK TYPE: BEC (Business Email Compromise)

The attack

Attempts to conduct fraud by soliciting a payment for a seemingly legitimate overdue invoice. Messages are highly personalized and targeted:

  • The PDF attachment of the invoice contains the target organization’s name and real mailing address
  • The sender impersonates a VIP within the organization
  • Messages target the CFO or individuals within the finance department.

The attached PDF also contains a fabricated W-9 form with a fake SSN, signed by a fictitious persona. Attachment: Inv no# 000635238.pdf.

Detection signals

Sublime detected and prevented this attack using the following top signals:

  • Fake invoice: The messages contain a fake invoice embedded within the message body, as well as attached to the message as a PDF. The PDF is highly personalized to the target organization
  • Fake thread: A fake forwarded message is used to add legitimacy and urgency
  • BEC lanugage: The message contains language resembling a BEC (Business Email Compromise) attack, which is detected using our Natural Language Understanding (NLU) model
  • VIP impersonation: The attacker impersonates the organization’s CEO or other VIPs
  • New domain: Some, but not all, sender domains observed in this campaign were registered within the last 30 days

Sublime detects and prevents BEC and other email based threats. Deploy an instance in alert-only mode.

Heading

About the authors

Threat Detection Team
Threat Detection Team
Sublime

The Threat Detection team at Sublime is responsible for monitoring environments to discover emerging email attacks and developing new Detection Rules for the Core Feed.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern