The fraudulent use of a company's identity to obtain credit, goods, or services. Attackers may file fake documents, create fraudulent accounts, or impersonate the business to steal funds or damage its reputation.
Related Terms
Business Email Compromise (BEC)
phishingA sophisticated scam targeting businesses that regularly perform wire transfers or handle sensitive data. Attackers comp...
Impersonation
social-engineeringThe act of pretending to be another person to deceive victims into trusting the attacker. In cybersecurity, impersonatio...
Social Engineering
social-engineeringThe psychological manipulation of people into performing actions or divulging confidential information. Social engineeri...