Verify business requests before you pay.
Business Email Compromise (BEC) is a multi-billion dollar scam industry. Attackers impersonate high-level executives, vendors, or legal partners to trick employees into making fraudulent wire transfers or revealing sensitive corporate data.
Security Insight
BEC attacks often involve no malicious links or malware. Instead, they rely purely on social engineering and 'Lookalike Domains' to convince victims that they are communicating with a trusted colleague or partner.
How to spot a Business Email Scam
Corporate scams are often highly targeted and sophisticated. Watch out for these specific 'Executive' and 'Vendor' red flags before authorizing any request.
The 'CEO Fraud' request
Invoice 'Change of Bank' details
Lookalike Company Domains
Unusual 'Off-Platform' requests
What IsThisSpam checks before you trust a sender
Quick verdicts are useful, but the real value is understanding why something looks safe, uncertain, or risky.
High-Pressure urgency
Phrases like 'Quick request', 'Are you at your desk?', or 'Needs to be done by EOD' are used to bypass standard verification protocols.
Inconsistent Reply-To addresses
The 'From' address looks official, but when you click 'Reply,' the destination address changes to a completely different personal domain.
Mismatched tone of voice
The email uses language, greetings, or formatting that doesn't sound like the person they are impersonating (e.g., a formal CEO suddenly using slang).
Requests for Confidentiality
Explicit instructions to keep the request secret or 'under the radar' to prevent you from discussing it with your manager or the IT department.
Related guides
Use the checker for the fast answer, then read the deeper guidance for recurring scam patterns.
Zoho Mail Scam Checker
Email Header Analyzer
FAQ
These are the questions people usually ask right before they click, reply, or pay.
Got a screenshot or attachment? Our AI can analyse it.
Check the sender before you trust the message.
Start with a fast scan, then move to SuperScan when the message involves money, account access, or sensitive documents.