Talk to sales

Ask a member of our sales team about our products or services:


Learn how to identify and stop impostor email threats (also known as email fraud). This infographic describes the four types of impostor emails, who they target, and the most-used topics for subject lines.

According to the FBI, this type of scam has siphoned more than $2.3 billion from more than 17,000 victims—and those are just reported incidents. Impostor emails succeed for three primary reasons:

  • They look and feel legitimate
  • They do not include a malicious link or malware attachment
  • They do not arrive in high enough volumes to raise red flags in most anti-spam tools

Because these threats do not use malicious attachments or URLs, impostor emails can evade solutions that look for only malicious content or behavior. That’s why they require a different approach. An effective solution must dynamically analyze the attributes of all email as it arrives and detect anomalies that point to an impostor. 

Learn More About Proofpoint Solutions:

Email Fraud

Email Protection Solutions Suite

Proofpoint Email Security & Protection

To learn more about BEC and CEO email fraud, download The Impostor in the Machine whitepaper.

Email Fraud, Business Email Compromise, CEO Fraud, CEO Phishing, Impostor Email Threats