📧 Business Email Compromise

Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.

31 procedures8 lifecycle stages

Triage

(5 procedures)

Containment

(3 procedures)
Sponsored

Preservation

(5 procedures)

Collection

(7 procedures)

Analysis

(4 procedures)

Eradication

(3 procedures)

Recovery

(1 procedure)

Post-Incident Review

(3 procedures)