📧

Business Email Compromise

Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.

31 runbook nodes8 lifecycle stages covered

Triage

(5 nodes)

Containment

(3 nodes)

Preservation

(5 nodes)

Collection

(7 nodes)

Analysis

(4 nodes)

Eradication

(3 nodes)

Recovery

(1 node)

Post-Incident Review

(3 nodes)