The CEO Who Wired $17 Million to a Criminal

In 2016, an executive at Austrian aerospace parts manufacturer FACC received what appeared to be a routine email from the company's CEO. The message instructed a wire transfer of approximately €42 million — roughly $47 million — to accounts controlled by threat actors. The attackers had studied the company's internal communication patterns, mimicked the CEO's writing style, and timed the request perfectly. FACC lost the money. Both the CEO and CFO lost their jobs.

That's a whaling attack in cybersecurity — and it's the most financially devastating form of phishing on the planet. These aren't the sloppy Nigerian prince emails your spam filter catches before breakfast. Whaling attacks are handcrafted, meticulously researched campaigns that target your C-suite, board members, and senior leadership with surgical precision. If you're responsible for protecting an organization, this is the threat that should keep you up at night.

I've spent years training organizations on exactly these scenarios. And I can tell you: most companies don't take whaling seriously until after the wire transfer clears.

What Makes a Whaling Attack Different From Phishing

It's Not Spray-and-Pray — It's a Sniper Round

Standard phishing casts a wide net. An attacker sends thousands of generic emails hoping someone clicks. Spear phishing narrows the target to specific individuals. Whaling takes it further — it exclusively targets the biggest fish in the organization. CEOs, CFOs, general counsel, board directors.

The FBI's Internet Crime Complaint Center (IC3) has tracked Business Email Compromise (BEC) — the category that includes whaling — as one of the costliest cybercrime types for years. Their 2020 Internet Crime Report documented $1.8 billion in BEC losses from reported incidents alone. That number dwarfs ransomware losses. And whaling attacks represent the highest-value subset of BEC.

The Anatomy of a Whale Hunt

Here's what actually happens before that fraudulent email lands in your CEO's inbox:

  • Reconnaissance: Attackers spend weeks mining LinkedIn, SEC filings, press releases, conference speaker lists, and social media. They learn who reports to whom, what deals are in progress, and when executives travel.
  • Pretext development: They craft a scenario that aligns with real business activity. An acquisition closing next week? A vendor payment that's overdue? A legal settlement requiring confidentiality?
  • Domain spoofing or compromise: They either register a look-alike domain (yourcompany-corp.com) or compromise an actual executive email account through credential theft.
  • The ask: The email requests a wire transfer, sensitive employee data (W-2s are a favorite), or access credentials. It always carries urgency and a reason for secrecy.
  • Extraction: Money moves to mule accounts and gets laundered through multiple countries within hours.

The social engineering here is world-class. These attackers understand corporate hierarchies, authority bias, and time pressure better than most management consultants.

Real Whaling Attacks That Cost Millions

Ubiquiti Networks — $46.7 Million Gone

In 2015, networking technology company Ubiquiti Networks disclosed in an SEC filing that it lost $46.7 million to a social engineering scheme targeting its finance department. Attackers impersonated executives and used fraudulent requests directed at the company's Hong Kong subsidiary. Ubiquiti recovered about $15 million — the rest vanished through overseas accounts.

Mattel — The Transfer That Almost Stuck

In 2016, a senior finance executive at Mattel received a request from what appeared to be the newly installed CEO to wire $3 million to a bank in China. The executive complied — the request seemed legitimate given the new leadership transition. It was only through luck and timing (a Chinese banking holiday) that Mattel managed to recover the funds.

The Crelan Bank Incident — $75 Million

Belgian bank Crelan lost approximately €70 million (around $75 million) in a whaling attack discovered in early 2016. The details were kept largely private, but the loss was confirmed in the bank's financial statements. That's not a rounding error — that's the kind of hit that reshapes an organization.

These aren't outliers. They're representative of a pattern that the Verizon 2020 Data Breach Investigations Report confirmed: social engineering attacks — especially those targeting senior staff — remain among the most effective intrusion methods across all industries.

Why Executives Are the Perfect Targets

I've run phishing simulations across hundreds of organizations. And here's the uncomfortable truth: executives fail phishing tests at higher rates than most other employee groups.

Why? Several reasons:

  • Authority insulation: Nobody questions the CEO. And the CEO isn't used to being questioned. This creates a culture where fraudulent requests from "above" get processed without verification.
  • Volume and speed: Executives process enormous amounts of email daily. They skim. They delegate. They approve things on mobile devices between meetings.
  • Public exposure: Executive schedules, travel plans, and business relationships are often publicly documented. Attackers don't need to hack anything — they just need Google.
  • Exemption from training: In my experience, C-suite leaders are the most likely group to skip security awareness training. They consider themselves too busy or too senior. That's exactly what threat actors count on.

How Do You Defend Against Whaling Attacks?

This is the question that lands people on this page, so let me be specific. Defending against whaling attacks in cybersecurity requires layered controls — technical, procedural, and human.

1. Mandatory Security Awareness Training — No Exceptions

Your executives need training more than anyone. Not a once-a-year compliance checkbox — ongoing, scenario-based training that includes realistic whaling simulations. Our cybersecurity awareness training program is built specifically to address threats like these across all organizational levels, including the C-suite.

Training should cover how to recognize urgency manipulation, authority spoofing, and pretexting. If your CEO has never been through a phishing simulation, you have a critical gap.

2. Phishing Simulations That Target Leadership

Generic phishing tests won't prepare executives for whaling. You need simulations that mirror actual whaling techniques — impersonating board members, referencing real deals, using look-alike domains. The phishing awareness training for organizations we offer includes targeted simulation capabilities that test exactly these scenarios.

When an executive falls for a simulation, that's not a failure — it's a learning moment that costs zero dollars instead of millions.

3. Wire Transfer Verification Procedures

Every organization needs an ironclad policy: no wire transfer above a defined threshold gets executed based solely on email authorization. Period. Require out-of-band verification — a phone call to a known number, an in-person confirmation, or a secondary approver who independently contacts the requestor.

The FACC attack, the Ubiquiti attack, the Mattel attack — every single one could have been stopped by a simple phone call.

4. Multi-Factor Authentication on Executive Email Accounts

If an attacker compromises your CFO's actual email account, no amount of email inspection will catch the fraud. Multi-factor authentication (MFA) on all executive accounts is non-negotiable. Use hardware tokens or app-based authentication — not SMS, which is vulnerable to SIM swapping.

5. Email Authentication Protocols

Implement DMARC, DKIM, and SPF across all company domains. These protocols make it significantly harder for attackers to spoof your domain in outbound emails. CISA's Binding Operational Directive 18-01 mandated these protocols for federal agencies — your organization should follow the same standard.

6. Zero Trust Principles for Financial Processes

Apply zero trust thinking beyond your network architecture. No single person should be able to authorize and execute a large financial transaction. Separation of duties, dual authorization, and mandatory verification loops create friction — and that friction is exactly what stops whaling attacks from succeeding.

7. Monitor for Look-Alike Domains

Attackers frequently register domains that closely resemble yours — swapping a letter, adding a hyphen, using a different TLD. Monitor new domain registrations that mimic your brand. Several threat intelligence services provide this capability, and your IT security team should be reviewing these alerts weekly.

The Human Element Is the Entire Attack Surface

I want to be clear about something: whaling attacks don't exploit software vulnerabilities. They exploit human psychology. Authority bias, urgency, fear of consequences, desire to be helpful — these are the vulnerabilities that threat actors target.

That means your primary defense is your people. And your people need to be trained, tested, and empowered to question suspicious requests — even when those requests appear to come from the CEO.

Build a culture where a finance director can call the CEO and say, "I got your email about the wire transfer. I need to verify before I process it." If your culture punishes that kind of caution, you're pre-compromised.

Whaling Is Evolving — And Getting Harder to Spot

The whaling attacks of 2021 are more sophisticated than those from five years ago. Threat actors now use:

  • Compromised legitimate accounts instead of spoofed domains — making email authentication useless as a detection layer.
  • Thread hijacking — inserting themselves into existing email conversations between executives.
  • Deepfake voice calls — in 2020, a bank manager in the UAE was reportedly deceived by AI-generated voice cloning during a business transaction. This technology is getting cheaper and more accessible.
  • Multi-stage attacks — starting with a low-stakes request ("Can you update your direct deposit info?") to build trust before the big ask.

The game is changing fast. Static defenses won't cut it. Continuous security awareness training, regular phishing simulations, and adaptive procedures are the only way to keep pace.

What to Do If You Suspect a Whaling Attack

If you or someone in your organization receives a suspicious executive request:

  • Do not respond to the email. Don't click any links or open attachments.
  • Verify through a separate channel. Call the supposed sender at a known phone number. Walk to their office. Text them on a personal device.
  • Report it immediately to your IT security team or incident response function.
  • Preserve the email with full headers for forensic analysis.
  • If money has already been transferred, contact your bank immediately and file a report with the FBI's IC3 at ic3.gov. Speed matters — law enforcement has recovered funds when banks act within 24-48 hours.

Your C-Suite Is Your Biggest Risk — And Your Best Defense

Whaling attack cybersecurity isn't a niche topic. It's the most expensive form of social engineering your organization faces. The average cost of a data breach hit $3.86 million in 2020 according to IBM and Ponemon Institute research — and a single successful whaling attack can exceed that in one wire transfer.

The organizations that survive these threats are the ones that train their executives with the same rigor they apply to front-line employees. They run realistic phishing simulations. They enforce verification procedures without exceptions. And they build cultures where healthy skepticism is rewarded, not punished.

Start by getting your leadership team through proper training. Assess your wire transfer policies. Deploy MFA everywhere. And accept that the biggest cybersecurity risk in your organization might be sitting in the corner office.