According to the FBI's Internet Crime Complaint Center (IC3) 2024 report, real estate is the single largest industry target for Business Email Compromise — and the numbers are staggering. In 2024 alone, BEC attacks on real estate and mortgage transactions cost victims $2.9 billion. The average loss per incident: $178,000. That's not a rounding error. That's a buyer's entire down payment, a family's life savings, wired in seconds to a criminal's account halfway around the world.
Buyers lose the money they saved for years. Agents face license suspension and professional liability claims. Brokers get dragged into lawsuits that drag on for years. Title companies see their reputations destroyed overnight. And because wire transfers are nearly instant and globally dispersed, once the money is gone it is almost always gone for good.
This isn't a fringe risk. It is the dominant fraud threat in the real estate industry right now, and it is growing every year. Understanding exactly how it works — and what stops it — is no longer optional for anyone who handles real estate transactions.
How Wire Fraud Works in Real Estate
Business Email Compromise in real estate follows a remarkably consistent playbook. The attack is methodical, patient, and devastatingly effective precisely because it exploits normal business behavior rather than technical system weaknesses.
Here is the anatomy of a real estate BEC attack, step by step:
- The attacker compromises an inbox. Through a phishing email, a credential-stuffing attack against a weak password, or malware on an agent's device, the attacker gains access to an email account. This could be the listing agent, the buyer's agent, the escrow officer, or anyone at the title company. Any inbox in the transaction chain is a viable entry point.
- The attacker monitors silently. Rather than acting immediately, the attacker reads incoming and outgoing mail for days or weeks. They learn the transaction timeline, the names of all parties, the escrow company being used, the approximate closing date, and the communication style of the people involved. They wait.
- The attacker sends a convincing wire instruction change. Days before closing — when urgency is high and everyone is focused on getting the deal done — the attacker sends an email impersonating the escrow officer or title company. The email references real names, real transaction details, and explains that there has been a "last-minute change" to the wire instructions. The new account number belongs to the attacker.
- The buyer wires the funds. Because the email looks completely legitimate — correct names, correct transaction details, the right tone — the buyer follows the instructions and wires their down payment or closing funds to the fraudulent account.
- The funds are gone. Within minutes of the wire hitting the fraudulent account, the money is moved again — often multiple times across multiple accounts in multiple countries. By the time anyone realizes what happened, the trail is cold and the funds are virtually unrecoverable.
FBI IC3 finding: The FBI reports that once wired, fewer than 50% of stolen funds are ever recovered — and that recovery rate drops sharply the longer it takes to report the fraud.
Why Real Estate Is the Perfect Target
Cybercriminals do not choose real estate transactions at random. The industry is structurally designed, from a fraud perspective, to be exceptionally vulnerable. Several factors converge to make it ideal hunting ground.
Email is the primary communication channel. In virtually every real estate transaction, the entire paper trail — offers, counteroffers, disclosures, escrow instructions, wire details — flows through email. There is no secondary verification channel built into the process. If an attacker can control one email account, they can impersonate any party convincingly.
The transaction values are enormous. A single residential transaction in Southern California routinely involves wire transfers of $300,000, $500,000, or more. The return on investment for a successful attack is extraordinarily high compared to the effort required.
Closing pressure creates poor decision-making. At closing time, buyers are exhausted, emotionally invested, and operating under deadline pressure. Agents are managing multiple parties simultaneously. Escrow officers are processing dozens of files. This environment is perfectly designed to make people skip verification steps they know they should take.
Multiple parties mean multiple attack surfaces. A single transaction involves the listing agent, the buyer's agent, the escrow company, the title company, the lender, and the buyer. Any one of these parties' inboxes is a viable entry point. The attacker only needs to compromise one to have visibility into the entire transaction.
The Callback Verification Procedure
There is one defense that, if executed consistently, stops wire fraud cold in virtually every case. It is not technical. It does not require software or a security budget. It requires only a phone call.
The rule that matters: Never confirm wire instruction changes by email. Always call the escrow officer or title company using a phone number you independently looked up — never one provided in the email.
Here is the exact procedure, step by step:
- You receive a wire instruction email. It may look completely legitimate. It may reference real names, the correct property address, and the actual escrow company. Treat it as unverified regardless.
- Do not click any links in the email. Do not call any phone number listed in the email. Do not reply to the email. Do nothing with it until you have independent verification.
- Find the escrow company's phone number from a source you already have. This means your original paperwork, a business card you received in person, or the company's official website that you navigate to directly — not a link from the email. If you do not already have a number on file, look it up independently.
- Call that number and speak to the escrow officer verbally. Ask them to confirm the wire instructions on record for your transaction. Read back the account number and routing number from the suspicious email and ask if they match.
- Only after verbal confirmation do you wire. If the escrow officer confirms the instructions match, proceed. If they say they did not send any change to the instructions, you have just stopped a fraud attack before it cost anyone a dollar.
This procedure adds five minutes to a closing. It has stopped hundreds of millions of dollars in theft. Every real estate professional and every buyer should treat it as an absolute, non-negotiable step in every transaction.
Technical Defenses That Protect Real Estate Organizations
The callback procedure is the most critical human control. But technical controls at the brokerage, escrow company, and title company level create the infrastructure that makes attacks harder to execute in the first place. Any real estate organization operating without these protections is running at unnecessary risk.
-
1Multi-factor authentication on all email accounts. MFA means that even if an attacker obtains an agent's email password — through phishing, a data breach, or credential stuffing — they cannot log in without the second factor. This single control blocks the most common initial access method used in real estate BEC attacks. Enable it on Microsoft 365, Google Workspace, and every other platform your team uses. No exceptions.
-
2Advanced email filtering with anti-spoofing enforcement. DMARC, DKIM, and SPF are email authentication standards that prevent attackers from sending emails that appear to come from your domain. Properly configured, these controls stop a significant percentage of impersonation attempts before they reach a recipient's inbox. Many real estate brokerages are running without any of these configured.
-
3Email encryption for transaction communications. Encrypting email communications containing wire instructions and financial details adds a layer of protection even if an inbox is compromised — the attacker cannot simply forward or intercept plaintext wire details without detection.
-
4Endpoint protection on all agent and staff devices. Many inbox compromises begin with malware on an agent's laptop or mobile device that captures credentials. Modern Endpoint Detection and Response (EDR) tools monitor device behavior in real time and stop credential-stealing malware before it can exfiltrate passwords.
-
5Mobile Device Management (MDM). Agents conduct significant amounts of business on mobile devices — often personal phones not managed by the brokerage. MDM solutions allow organizations to enforce security policies, require device encryption, and remotely wipe compromised devices before they become an entry point into transaction communications.
-
6Transaction platform security review. Platforms like Dotloop, DocuSign, and Skyslope are widely used in real estate and are themselves targets. Review account security settings, enable MFA on all platform accounts, audit who has access to active transaction files, and confirm that wire instruction delivery through these platforms includes out-of-band verification prompts.
-
7Cyber insurance with BEC and social engineering coverage. Standard commercial property and E&O policies do not cover wire fraud losses. Dedicated cyber insurance with explicit Business Email Compromise and social engineering endorsements is now a baseline requirement for any real estate brokerage, escrow company, or title firm. Review your policy carefully — coverage exclusions vary significantly.
What to Do If Wire Fraud Has Already Occurred
If you suspect that funds have been wired to a fraudulent account, the next few hours are the only window you have. Speed is not merely important — it determines whether any recovery is possible at all.
- Call your bank immediately. Do not send an email. Do not go through normal support channels. Call the fraud department directly and tell them you need to initiate a wire recall. Banks have emergency protocols for this, but they can only act while the funds are still in a reachable account. Every minute counts.
- Call the FBI IC3 hotline. The number is 1-800-CALL-FBI (1-800-225-5324). The FBI operates a Financial Fraud Kill Chain — a coordinated process that can freeze fraudulent accounts across banks if activated quickly enough. This process has worked, but only when reported within hours.
- File a complaint at ic3.gov within 24 hours. The online complaint form at ic3.gov is the official reporting mechanism. File it with as much detail as possible: the fraudulent account number, routing number, amount wired, time of the wire, and all email communications related to the fraud.
- Notify your broker and legal counsel immediately. There are mandatory reporting and disclosure obligations that may apply depending on your state and your license type. Get your attorney involved immediately — both to protect your interests and to ensure you fulfill any required notifications to affected parties.
- Document everything now. Screenshot every email, save every communication, document every phone call with timestamps. This documentation is critical for the FBI investigation, your bank's fraud claim, your insurance claim, and any subsequent legal proceedings.
Time is the only variable you can control at this point. Every delay reduces the probability of recovery. Do not wait until morning. Do not wait until you have all the information. Make the calls now.
How Quickly It Can Happen: A Composite Case
Fictionalized composite based on documented IC3 case patterns from the FBI's 2024 Internet Crime Report.
The buyer in that case did everything right on their end. They followed the wire instructions they received from what appeared to be their escrow company. The instructions came from the right email address, referenced the correct property, and arrived at the expected time. The only thing missing was a single phone call to a number they already had in their paperwork.
That is the entire gap between a successful closing and a financial catastrophe. A five-minute phone call.
Protect Your Real Estate Transactions with IT Center
IT Center works with real estate brokerages, escrow companies, and title firms across Southern California to deploy the email security, endpoint protection, and staff training that stops BEC attacks before they reach your clients. See how we protect real estate organizations end to end.
See Our Real Estate IT Services