📧 Business Email Compromise
Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.
31 procedures8 lifecycle stages
Triage
(5 procedures)Bound the Investigation Timeframe
Timeframe Bounding
30min
View procedure
Identify Patient Zero (First Compromised System)
Patient Zero
60min
View procedure
Analyze Suspicious Email for BEC Indicators
BEC Email Analysis
45min
View procedure
Phishing Email Triage and Indicator Extraction
Phishing Triage
30min
View procedure
Validate the Initial Access Vector
Access Validation
45min
View procedure
Containment
(3 procedures)Credential and Account Lockdown
Account Lockdown
45min
View procedure
Revoke Cloud Sessions and Tokens
Revoke Cloud Sessions
30min
View procedure
Phishing Containment: Block, Quarantine, Purge
Phishing Quarantine
45min
View procedure
Sponsored
Preservation
(5 procedures)Volatile Memory Capture
Memory Capture
60min
View procedure
Log Preservation and Snapshot
Log Snapshot
45min
View procedure
Preserve Phishing Email Evidence
Phishing Email Preservation
45min
View procedure
Document Chain of Custody for All Collected Evidence
Chain of Custody
30min
View procedure
Cloud Tenant Configuration Snapshot
Cloud Tenant Snapshot
60min
View procedure
Collection
(7 procedures)Phishing Artifact Collection: Headers, URLs, Attachments
Phishing Artifact Collection
60min
View procedure
EDR Telemetry Collection
EDR Collection
120min
View procedure
M365 Unified Audit Log Collection
M365 UAL Collection
90min
View procedure
Collect DLP Policy Alerts and Hits
DLP Alerts
45min
View procedure
Azure AD Sign-In and Audit Log Collection
Azure AD Logs
60min
View procedure
Identify Alternative Evidence When Primary Logs Are Missing
Missing Log Fallback
60min
View procedure
Coordinate Log Collection from Third-Party Vendors
Third-Party Logs
120min
View procedure
Analysis
(4 procedures)Lateral Movement Analysis and Mapping
Lateral Movement
120min
View procedure
Phishing Campaign Scope and Credential Exposure
Phishing Campaign Analysis
90min
View procedure
Detect OAuth and Consent Phishing Abuse
OAuth Abuse
60min
View procedure
Investigate Mailbox Rule Modifications
Inbox Rules
45min
View procedure