Deepfake-Enabled BEC: The Claim Trend Underwriters Cannot Ignore
Business email compromise has been the most financially devastating category of cybercrime for years. Now deepfakes are supercharging that dynamic, and the claims data is starting to reflect it.
Business email compromise has been the most financially devastating category of cybercrime for years. The FBI’s Internet Crime Complaint Center recorded 21,442 BEC complaints in 2024 — far fewer than phishing — but the losses hit $2.77 billion. BEC has always punched above its weight because it targets trust, not technology. Now deepfakes are supercharging that dynamic, and the claims data is starting to reflect it.
This is not a theoretical risk. Deepfake fraud losses have reached $12 billion globally, and Deloitte projects that figure could hit $40 billion within two years. Deepfake incidents have surged over 1,500% in the last two years alone. For underwriters and brokers, the question is no longer whether deepfake-enabled BEC will affect your book — it is how fast.
The BEC Problem
Traditional BEC attacks rely on social engineering: compromised email accounts, lookalike domains, or impersonation of executives. The attacker convinces someone in finance to wire money to a fraudulent account. The average loss per BEC incident exceeds $125,000.
These attacks work because they exploit human trust. The victim believes they are responding to a legitimate request from a real person they know. Verification procedures help, but determined attackers find ways around them.
How Deepfakes Change the Equation
Deepfake technology has democratized rapidly. What once required Hollywood-budget resources can now be produced with open-source tools and a few minutes of sample audio or video. For BEC attackers, this opens new attack vectors:
- Voice cloning: Attackers can impersonate a CEO’s voice from just a few seconds of sample audio, then call the finance team to “confirm” a wire transfer request.
- Video impersonation: Real-time deepfake video can make an attacker appear to be a known executive during a video call.
- Hybrid attacks: Combining traditional email compromise with deepfake “verification” creates attacks that bypass standard anti-fraud controls.
Claims Implications
For cyber insurers, deepfake-enabled BEC creates several challenges:
- Higher loss severity: Deepfake “verification” can convince victims to transfer larger amounts than email-only attacks.
- Coverage questions: Is a deepfake-enabled loss a “social engineering” loss (often sublimited) or a traditional fraud loss?
- Due diligence expectations: What verification procedures should policyholders be expected to implement?
- Aggregation risk: A single deepfake campaign could hit multiple insureds simultaneously.
What Underwriters Should Do
- Update underwriting questionnaires: Ask specifically about voice and video verification procedures for high-value transfers.
- Review social engineering sublimits: Consider whether current limits adequately reflect the increased severity risk from deepfakes.
- Monitor claims data: Track whether deepfake-related claims are emerging in your book.
- Educate brokers: Help distribution partners understand this evolving risk so they can advise insureds appropriately.
For Brokers
Your clients may not realize how quickly this threat is evolving. A brief conversation about deepfake risks and simple controls (callback procedures, out-of-band verification for high-value transfers) can differentiate your service and potentially prevent a major claim.
This article is for informational purposes only and does not constitute underwriting, legal, or coverage advice.
Get the full picture with premium access
In-depth reports, assessment tools, and weekly risk intelligence for cyber professionals.
Pro Membership
Founding member price — lock it in forever
Unlimited reports + tools + alerts
Subscribe Now →Free NIS2 Compliance Checklist
Get the free 15-point PDF checklist + NIS2 compliance tips in your inbox.
No spam. Unsubscribe anytime. Privacy Policy
Featured
NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage
8 min read
NIS2 Underwriting Questions: What Every Cyber Insurance Broker Should Ask
14 min read
Agentic Security: What Underwriters Need to Know in 2026
8 min read
The NIS2 Audit Crunch: What Underwriters Need to Know Before June 30, 2026
10 min read
Premium Report
2026 Cyber Risk Landscape Report
24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.
View Reports →Related posts
Agentic Security: What Underwriters Need to Know in 2026
Autonomous AI agents are entering production at scale — and they bring a completely new attack surface that traditional cyber insurance questionnaires weren't designed to capture.
How AI Is Changing Cyber Risk Assessment
A look at how AI and multi-agent systems are starting to transform the way we evaluate and underwrite cyber risk.
AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives
Exploring how AI transforms cyber risk from three angles: how threat actors weaponize it, how security teams deploy it, and how underwriters must adapt their approach.