Review urgent executive emails, wire requests, and vendor-spoofing messages
Common Examples
About This Scanner
Business email compromise scams use spoofed executive accounts, fake vendor threads, and payroll changes to push fast payments or sensitive data requests. This checker helps teams review suspicious workplace emails before they approve transfers, update payroll, or share confidential information.
Paste text messages
Copy and paste any suspicious message
Upload screenshots
Share images of conversations
Check URLs
Verify suspicious links and websites
Verify numbers
Check caller phone numbers
Top Red Flags
The email uses authority, secrecy, and urgency to bypass normal approval steps.
The sender display name looks familiar, but the real domain or reply path does not match company norms.
You are asked to move money, change payroll, buy gift cards, or share confidential documents unusually fast.
How to Check This Scam
1
Paste the suspicious business email into AskdwinAI to spot authority manipulation and impersonation patterns.
2
Verify the request through a known phone number, Slack channel, or internal approval flow outside the email.
3
Inspect the sender address, reply-to field, and writing style for subtle mismatch clues.
How to Report This Scam
Notify internal security, finance, and leadership immediately if the email targeted funds or payroll.
Freeze pending transactions or account changes where possible.
Save the email headers and report the spoofing attempt to your IT or email provider.
Need more context before using the detector? These matching guides explain the most common search patterns, red flags, and next actions for this scam type.