CASE FILE // PC-2026-04
Status: Open


Filing 02.03.00Field 27 APR 2026Classification PublicStatus Open

Whaling and CEO fraud: the $5.10M event and the deepfake era

Average per-incident cost: $5.10M (IBM 2025). Q1 2025 deepfake-call wave drove $200M+ in publicly-reported losses. The Arup $25M Hong Kong case set the reference for the deepfake-enabled variant in February 2024.

Exhibit A

The category, the dollar figure, the trajectory

IBM 2025

Whaling is the variant of phishing that targets a single senior decision-maker with the intent of obtaining a payment authorisation, a high-value approval, or material-non-public information. The category overlaps with Business Email Compromise when the attack ends in a wire transfer, but is distinct because the defining feature is the target profile (C-suite, board member, controller, treasurer) rather than the payload type. The 2026 per-incident cost figure of $5.10M from IBM's Cost of a Data Breach 2025 cohort is the highest of any phishing sub-category and has been rising at approximately 11 to 14 percent year-on-year since 2022.

The trajectory is driven by two factors. First, the average size of executive-authorised wires has grown with corporate consolidation; a single CFO-approved transaction now routinely exceeds $5M in mid-market firms and $50M in large-cap firms. Second, the deepfake-voice and deepfake-video toolchain became commodity-priced in 2024, eliminating the out-of-band-confirmation defence that boards had relied on for two decades. The Arup Hong Kong incident of February 2024 was the public moment when the new threat model became unavoidable; the Q1 2025 wave of similar cases confirmed it as a structural shift rather than a one-off.[IBM 2025 whaling cohort + IC3 2024]

Exhibit B

The Arup Hong Kong case: the canonical 2024 reference

CASE FILE

In late January 2024, an Arup employee in the firm's Hong Kong office received an email purportedly from the CFO requesting a confidential transaction. The employee was suspicious because confidential-transaction language is itself a known phishing lure. To verify, the employee joined a video conference call where the CFO, two other senior leaders, and several colleagues were present and visibly authorised the transaction. Over the following weeks the employee initiated 15 transfers totalling approximately HK$200M (USD $25.6M) to five Hong Kong bank accounts. Every other participant on the video call had been a deepfake reconstruction built from publicly-available video and audio of the executives.

The case became public in early February 2024 when Hong Kong Police announced the investigation, and Arup confirmed the incident publicly in May 2024 through a statement to the press. The technical anatomy is now well understood: attackers harvested public video of the executives from earnings calls, conference appearances, and corporate communications, used a current-generation face-swap and voice-clone toolchain to build the deepfake participants, and ran the video call live with a synthesised script tailored to the target's verification expectations. The toolchain cost was estimated by independent analysts at under $5,000 in compute and software, against a $25.6M attack outcome. The unit economics are unfavourable to defenders.

The defender lesson from Arup is not that the employee was negligent; the employee did exactly what training would recommend, which is to verify the request via a video channel. The lesson is that in-channel verification (joining a Teams or Zoom call to confirm) is no longer a sufficient control. Verification has to operate through an entirely different channel that the attacker cannot simultaneously control, such as an in-person confirmation, a callback to a phone number held in the HR system (not the email), or a hardware-token-signed approval workflow.[HK Police press release Feb 2024 + Arup public statement May 2024]

Exhibit C

The Q1 2025 deepfake-call wave: $200M+ in publicly-reported losses


Aggregating publicly-disclosed deepfake-call whaling losses across Q1 2025 produces a conservative floor of $200M in defender losses, drawn from SEC 8-K filings, court records of attempted recoveries, and major-incident press disclosures. The true figure is materially higher because most settled losses are not disclosed publicly. The cases that were disclosed cluster in three patterns: cross-border wire transfers from APAC subsidiaries to Hong Kong or UAE accounts, intra-EU SEPA transfers under the Single Euro Payments Area scheme that complete within seconds and cannot be reversed, and US domestic wires that exploited the 72-hour window before IC3 filing.

PatternTypical destinationPer-event loss bandRecovery posture
APAC sub to HK/UAE wireHong Kong, UAE$8M-$30MNear zero (no IC3 jurisdiction)
Intra-EU SEPA fast transferEU member state$1M-$5MSingle-digit % (irreversible scheme)
US domestic exploitUS bank$3M-$15M~30% gross, 71% with FFKC inside 72h
Crypto-routedMixer or exchange$500K-$3MNear zero

Per-event loss bands extracted from cross-referenced public disclosures and Chainalysis 2025 deepfake-fraud annex. APAC pattern dominates dollar volume; intra-EU pattern dominates incident count.[Aggregated public 2025 Q1 disclosures + Chainalysis 2025]

Exhibit D

Cost-line build-up against the $5.10M figure


The whaling event-cost line build differs from BEC because the regulatory and legal lines are structurally larger. A successful whale strike implicates the board as both attack target and accountable party, which triggers a heavier disclosure regime, a heavier insurance-coverage scrutiny step, and a higher probability of derivative litigation. The wire-loss line is comparable to BEC; everything downstream of the wire is larger.

Cost lineShare of $5.10MDollar figureWhy higher than BEC
Direct wire-fraud loss36%$1.84MLarger per-wire average for C-suite-authorised transfers
Legal + derivative-suit exposure21%$1.07MCaremark-doctrine director liability cited routinely
Incident response + forensics14%$714KPrivileged-counsel-led forensics, deepfake-attribution work
Regulatory fines + SEC disclosure cost11%$561KItem 1.05 8-K timing exposure, NYDFS 72-hour
Reputation + customer churn9%$459KBrand-damage from named-executive exposure
Notification + monitoring6%$306KIf exec-mailbox compromise touched customer data
Board-time + executive-coaching3%$153KReal cost rarely captured in BEC totals

Sub-line breakdown extracted from the IBM 2025 whaling-vector cohort with the legal-exposure line cross-referenced against publicly-filed derivative-suit settlements 2023-2025. The board-time line is rarely captured in standard IBM-format event accounting; including it lifts the modelled total by approximately 3 percent.[IBM 2025 whaling cohort + derivative-suit settlement public record 2023-2025]

Exhibit E

Board-risk model: from Caremark to SEC Item 1.05


Boards have moved from an oversight role in cyber to a personal-liability posture, and the whaling cost analysis has to factor in the director-liability surface. Two doctrines anchor the US picture. First, Delaware's Caremark line of cases (In re Caremark, 1996, refined by Marchand v. Barnhill, 2019, and Hughes v. Hu, 2020) establishes a board duty to ensure that information and reporting systems exist and are monitored on mission-critical risks. Cyber is now treated as mission-critical for any public company. A board that cannot demonstrate active oversight of cyber controls faces credible derivative-suit exposure when a major event occurs.

Second, SEC Item 1.05 of Form 8-K, effective December 2023, requires public-company disclosure of a material cybersecurity incident within four business days. A whaling event that compromised a C-suite mailbox or executed a material wire transfer crosses the materiality bar in almost every case. The 2024-2025 enforcement docket includes several actions where the delay-to-disclosure itself was the violation. The board's cost exposure includes not just the underlying event but the time-pressure decisions about disclosure during the first 96 hours.

For EU-headquartered firms, NIS2 imposes a parallel set of management-body accountabilities, including a personal training requirement for board members on cyber-risk oversight and personal liability for inadequate risk management. Cross-reference for the EU framework: soc2compliancecost.com and iso27001cost.com.[Delaware Caremark line + SEC Item 1.05 + NIS2 management-body provisions]

Exhibit F

Controls that work against deepfake-enabled whaling


The control landscape for whaling shifted in 2024. Pre-deepfake, the dominant control was an out-of-band confirmation procedure that recommended a video call to verify suspicious requests. That control is now actively dangerous because it routes the verification through the channel under attack. The new control set has to assume that voice and video are forgeable in real time.

#1Out-of-band confirmation via phone, using HR-system number

~80% of wire-loss when applied
Cost: $0 tooling, policy work

A hard rule that any out-of-pattern wire request is verified by phoning the executive on the number stored in the HR system, not the number in the email, the chat, or the video call. The control assumes that voice and video on any inbound channel may be synthetic.

#2Pre-shared codeword library between exec + finance team

~95% of impersonation when applied
Cost: $0 tooling, 1 hour per year of exec coordination

A small set of rotating verbal codewords known only to the executive and the controller. The exec includes the current codeword in any genuine high-value request. A request without the codeword is rejected. Cheap, simple, deepfake-resistant.

#3Hardware-signed approval workflow for outbound wires above threshold

~90% of all whaling wire-loss
Cost: $50 per key plus banking-system integration

Wires above a threshold (typically $250K to $1M depending on org) require a YubiKey-signed approval from two specified individuals within the banking portal itself. The deepfake cannot produce the signature.

#4Executive-asset hardening: voice and image takedown program

~30% of attacker source-material availability
Cost: $5K to $30K per exec per year

A continuous program that monitors and requests removal of public video and audio of named executives where it is not legally required to remain. Reduces but does not eliminate attacker training data.

#5Director-and-officer cyber-rider review

Coverage-completeness improvement
Cost: Insurance-broker time

D&O policies often exclude cyber-event-driven director liability under the bodily-injury or social-engineering carve-outs. Reviewing the rider against the current whaling threat model identifies gaps in personal coverage for directors.

#6Tabletop exercise with deepfake-call scenario

~50% of response-time degradation in real event
Cost: $15K to $40K per exercise

Annual tabletop that explicitly models a deepfake-call wire request. Drives recognition speed when the real event lands. The Arup case showed that even diligent employees miss the attack if they have never rehearsed the pattern.

Exhibit G

Reference cases beyond Arup


Ferrari, September 2024. An attacker placed deepfake-voice calls to a senior Ferrari executive impersonating the CEO Benedetto Vigna and instructing the executive to assist with a confidential acquisition. The Ferrari executive became suspicious and asked a verification question about a book the CEO had recently recommended. The attacker could not answer correctly and the attempt failed. The Ferrari case is the leading public example of a procedural defence (the verification-question challenge) succeeding against a deepfake voice attack.

WPP, May 2024. CEO Mark Read disclosed a deepfake-video attempt against the firm in which attackers cloned his image and voice for a WhatsApp video call attempting to extract confidential information from a senior WPP executive. The attempt failed because the targeted executive triggered an out-of-band confirmation procedure. WPP's public disclosure of the attempt was unusually candid and provided the industry with a working reference for the WhatsApp delivery channel.

Pre-deepfake reference: the Pathe Cinemas case, 2018. An attacker used email-only CEO impersonation to extract approximately EUR 19M from Pathe's Dutch subsidiary in a series of wire transfers framed as confidential acquisition payments. The case is significant because it pre-dated deepfake and demonstrated that even the email-only variant was capable of producing 8-figure losses. Two senior Pathe executives were dismissed following the incident and the parent company's recovery from the receiving accounts was approximately 1 percent. The Pathe case anchors the lower bound of the modern whaling cost picture; Arup anchors the upper bound.[Ferrari Sept 2024 public reporting + WPP May 2024 disclosure + Pathe 2018 public record]

Exhibit H

Frequently filed questions

ON RECORD

What is the difference between whaling and BEC?[open]

BEC is defined by the payload (a wire-redirection lure). Whaling is defined by the target (a senior decision-maker). The categories overlap when a whaling attack ends in a wire transfer. The cost profile of whaling is heavier on legal and disclosure lines because the board is implicated as both target and accountable party.

What is the average cost of a whaling attack?[open]

$5.10M per successful incident in the IBM 2025 cohort. The figure is the highest of any phishing sub-type and rising at 11 to 14 percent year-on-year.

How much did the Arup deepfake case cost?[open]

USD $25.6M across 15 transfers to five Hong Kong bank accounts, none recovered as of public disclosure in May 2024.

What is the single most effective control?[open]

A hard rule that out-of-pattern wire requests are verified by phone call to the executive's HR-system number, not the number in the inbound channel. Combined with pre-shared codewords this approaches 95% effectiveness.

Are directors personally liable in a whaling event?[open]

Increasingly yes. Caremark-doctrine derivative suits naming directors are now routine in US public-company cyber events. NIS2 in the EU imposes personal training and risk-management accountabilities on management bodies.

Does executive-asset hardening (removing public video) help?[open]

Modestly. It reduces but does not eliminate attacker training data because most executive video is required to be public under earnings-call and proxy-statement disclosure rules. A 30 percent reduction in source-material availability is achievable at $5K to $30K per executive per year.

What did the Ferrari case prove?[open]

That a procedural verification question can defeat a deepfake-voice attack if the question requires shared context the attacker does not have. The Ferrari executive asked about a recently-recommended book; the attacker could not answer.

Updated 2026-04-27