Business Email Compromise (BEC) Investigation Runbook

SOC & DFIR Operations Guide

Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access


Overview & Scope

This runbook provides standardised procedures for investigating Business Email Compromise (BEC) attacks across the Microsoft 365 environment. BEC attacks are sophisticated social engineering schemes that exploit email to defraud organisations, often resulting in significant financial losses and data breaches.

What is Business Email Compromise?

BEC is a type of cybercrime where attackers use email fraud to target organisations. Unlike traditional phishing, BEC attacks are highly targeted, well-researched, and often involve impersonating trusted parties or compromising legitimate email accounts.

Key Statistics:

  • BEC accounts for the largest financial losses in cybercrime

  • Often no malware involved - relies on social engineering

  • Targets finance, HR, executives, and legal departments

BEC Attack Categories

By Attack Type

Type
Description
Target
Financial Risk

CEO Fraud

Impersonation of executive requesting urgent wire transfer

Finance team

Critical

Account Compromise

Takeover of legitimate email account

Any employee

High

Invoice Fraud

Fake or modified invoices from "vendors"

Accounts Payable

Critical

Vendor Impersonation

Impersonating suppliers/partners

Procurement, Finance

High

Attorney Impersonation

Fake legal requests requiring urgent action

Executives, Finance

High

Data Theft

Targeting HR/Finance for W-2s, PII, payroll data

HR, Payroll

High

Gift Card Scam

Request to purchase gift cards

Any employee

Medium

Payroll Diversion

Request to change direct deposit information

HR, Payroll

High

By Compromise Method

Method
Description
Detection Difficulty

Spoofing

Forging sender address to appear legitimate

Low-Medium

Look-alike Domains

Using domains similar to legitimate ones (typosquatting)

Medium

Display Name Deception

Matching display name but different email address

Low

Account Takeover (ATO)

Compromising actual email account

High

Mailbox Rule Abuse

Creating rules to hide attacker activity

High

Reply-Chain Hijacking

Inserting into existing email conversations

Very High

Compromised Vendor

Using actually compromised third-party accounts

Very High

BEC Attack Lifecycle


Detection Sources & Data Mapping

Log Sources Matrix

Platform
Log Table
BEC-Relevant Data

Defender for Office

EmailEvents

Email metadata, delivery status

Defender for Office

EmailAttachmentInfo

Attachment analysis

Defender for Office

EmailUrlInfo

URLs in emails

Defender for Office

EmailPostDeliveryEvents

Post-delivery actions (ZAP)

Defender for Office

UrlClickEvents

User URL clicks

Exchange Online

OfficeActivity

Mailbox operations, rules

Exchange Online

CloudAppEvents

Mail send, forwarding

Entra ID

SigninLogs

Account access patterns

Entra ID

AuditLogs

Account changes

Entra ID

AADNonInteractiveUserSignInLogs

App-based sign-ins

Entra ID

RiskyUsers, RiskySignIns

Identity Protection alerts

Sentinel

SecurityAlert

Correlated BEC alerts

Sentinel

ThreatIntelligenceIndicator

Known BEC IOCs

Critical Detection Indicators

Email-Level Indicators

Indicator
Description
Risk Level

External sender with internal display name

Spoofing executive names

High

Look-alike domain

Typosquatted or similar domain

High

Reply-to mismatch

Reply address differs from sender

High

First-time sender

Never communicated before

Medium

Urgent financial request

Wire transfer, gift cards

Critical

Changed banking details

New account information

Critical

External forwarding rule

Mail forwarded outside org

Critical

Unusual sending patterns

Off-hours, unusual recipients

Medium

Account Compromise Indicators

Indicator
Description
Risk Level

Impossible travel

Sign-ins from distant locations

High

New inbox rules

Especially delete/forward rules

Critical

Suspicious sign-in properties

New device, browser, location

Medium

Mail forwarding changes

SMTP forwarding added

Critical

Delegate access added

New mailbox permissions

High

Bulk email operations

Mass delete, forward, export

High

OAuth app consent

New app with mail permissions

High

Legacy protocol sign-in

IMAP/POP3 authentication

High

Behavioral Indicators

Indicator
Description
Risk Level

Urgency language

"ASAP", "urgent", "confidential"

Medium

Authority assertion

"CEO approved", "don't tell anyone"

High

Process bypass requests

"Skip normal approval"

Critical

Gift card requests

Purchase and send codes

High

Banking change requests

New wire instructions

Critical

W-2/Tax form requests

Bulk PII requests

High

Unusual payment amounts

Outside normal ranges

Medium


Investigation Workflows

BEC Alert Triage

Objective: Quickly assess if a reported email is a BEC attempt and determine if any action has been taken.

Step 1: Initial Assessment

  1. Identify the reported email (subject, sender, recipient, time)

  2. Determine alert source (user report, automated detection, MDO)

  3. Check if email was delivered or blocked

  4. Assess the request type (wire transfer, gift cards, data)

  5. Determine urgency based on potential financial impact

Step 2: Email Analysis

  1. Review email headers for spoofing indicators

  2. Check sender domain reputation and age

  3. Analyze display name vs. actual email address

  4. Review reply-to address configuration

  5. Check for look-alike domain usage

  6. Examine email content for social engineering tactics

Step 3: Recipient Impact Assessment

  1. Identify all recipients of the email

  2. Check if any recipients replied or clicked links

  3. Review any attachments opened

  4. Determine if any actions were taken (wire sent, etc.)

  5. Contact recipients to verify no action taken

Step 4: Classification

Classification
Criteria
Action

External Impersonation

Spoofed/look-alike domain

Block domain, warn users

Account Compromise

Sent from legitimate internal account

Contain account, full investigation

Vendor Compromise

From actual compromised vendor

Contact vendor, block sender

False Positive

Legitimate email incorrectly flagged

Whitelist, close alert


Account Takeover (ATO) Investigation

Objective: Investigate suspected email account compromise used for BEC.

Step 1: Confirm Compromise

  1. Review sign-in logs for anomalies

  2. Check for impossible travel scenarios

  3. Look for new device/browser/location sign-ins

  4. Review MFA challenge results

  5. Check Identity Protection risk scores

Step 2: Assess Mailbox Activity

  1. Query mailbox audit logs for suspicious operations

  2. Check for inbox rule creation/modification

  3. Review sent items for unauthorised emails

  4. Check deleted items for evidence destruction

  5. Review mail forwarding configuration

Step 3: Identify Attacker Actions

  1. Map timeline of unauthorised access

  2. Identify emails sent by attacker

  3. Document inbox rules created

  4. Check for OAuth app consents

  5. Review delegate access changes

Step 4: Determine Impact

  1. List all recipients of fraudulent emails

  2. Check if financial requests were made

  3. Identify any data exfiltrated

  4. Review if other accounts were targeted

  5. Assess vendor/partner notification needs

Step 5: Containment

  1. Reset user password immediately

  2. Revoke all active sessions

  3. Remove malicious inbox rules

  4. Disable mail forwarding

  5. Revoke suspicious OAuth apps

  6. Enable/verify MFA

  7. Block attacker IPs if identified


Invoice/Payment Fraud Investigation

Objective: Investigate BEC attempts targeting financial transactions.

Step 1: Email Trail Analysis

  1. Locate the original fraudulent email

  2. Identify the full email thread/conversation

  3. Determine if legitimate thread was hijacked

  4. Check for prior reconnaissance emails

  5. Document all related communications

Step 2: Financial Request Analysis

  1. Review the specific financial request

  2. Compare requested account to known vendor details

  3. Verify with vendor through separate channel

  4. Check for recent "banking change" notifications

  5. Review invoice details for inconsistencies

Step 3: Payment Status

Status
Immediate Action

Not Sent

Block payment, warn finance team

Pending

Cancel immediately, contact bank

Sent < 24 hours

Contact bank for recall

Sent > 24 hours

Contact bank, likely unrecoverable

Step 4: Source Identification

  1. Determine if sender account was compromised

  2. Check if vendor's email was compromised

  3. Identify if domain spoofing was used

  4. Review for man-in-the-middle indicators

  5. Check for prior account access anomalies

Step 5: Recovery Actions

  1. Contact bank immediately for wire recall

  2. File IC3/FBI complaint for significant amounts

  3. Preserve all evidence for law enforcement

  4. Notify cyber insurance carrier

  5. Document timeline for legal purposes


Executive Impersonation Investigation

Objective: Investigate BEC attempts impersonating executives.

Step 1: Impersonation Analysis

  1. Identify the impersonated executive

  2. Compare spoofed email to legitimate address

  3. Check domain registration details

  4. Review email authentication results (SPF/DKIM/DMARC)

  5. Analyse writing style and signature

Step 2: Target Analysis

  1. Identify all recipients targeted

  2. Determine why these recipients were chosen

  3. Check for prior reconnaissance against targets

  4. Review if organisational info is publicly available

  5. Assess social engineering sophistication

Step 3: Campaign Scope

  1. Search for similar emails to other employees

  2. Check for other impersonated executives

  3. Look for variations in sender domains

  4. Identify common infrastructure (IPs, domains)

  5. Determine if targeted campaign or spray attack

Step 4: Response Coordination

  1. Alert executive being impersonated

  2. Send targeted warning to potential victims

  3. Block identified spoofing infrastructure

  4. Update email filters/rules

  5. Consider organisation-wide alert


Inbox Rule Abuse Investigation

Objective: Investigate malicious inbox rules created by attackers.

Common Malicious Rule Patterns

Rule Type
Purpose
Detection

Delete incoming

Hide responses about fraud

Rule deletes from specific senders

Move to RSS/Archive

Hide from primary view

Rule moves to obscure folders

Forward externally

Exfiltrate ongoing mail

Forwarding to external address

Delete sent items

Hide attacker's emails

Rule deletes sent mail

Mark as read

Prevent notification

Rule marks as read immediately

Auto-reply

Automate responses

Suspicious auto-reply content

Investigation Steps

  1. Export all inbox rules

    • Query OfficeActivity for rule operations

    • Review current rules via PowerShell/Admin Center

    • Check for hidden/obfuscated rules

  2. Analyse rule creation timeline

    • Correlate with sign-in anomalies

    • Check who created the rules

    • Identify source IP/device

  3. Assess rule impact

    • Determine what mail was affected

    • Check forwarding destinations

    • Review deleted/moved messages

  4. Remove malicious rules

    • Delete all attacker-created rules

    • Document rules for evidence

    • Monitor for re-creation


KQL Query Cheat Sheet

Email Analysis Queries

Suspicious External Senders with Internal Display Names

Look-alike Domain Detection

Reply-To Mismatch Detection

First-Time Sender to Executive

Emails with Financial Keywords


Account Compromise Detection

Sign-in Anomalies for Mail Users

Impossible Travel for Email Access

Legacy Protocol Authentication


Mailbox Activity Analysis

Inbox Rule Creation/Modification

Suspicious Inbox Rules (Forwarding/Deletion)

Email Forwarding Configuration Changes

Bulk Email Operations

Delegate/Permission Changes


Sent Email Analysis

Emails Sent to External Recipients

Emails with Wire Transfer Keywords (Sent)

Unusual Sending Patterns (Off-Hours)


Threat Intelligence Correlation

Known BEC Domains

Emails from Recently Registered Domains


Investigation Queries

Full Email Timeline for User

Identify All Emails in Fraudulent Thread

Cross-Reference Sign-ins with Email Activity


Response Actions & Remediation

Immediate Response Actions

BEC Email Reported (No Action Taken)

Step
Action
Tool/Method

1

Block sender domain

Exchange Admin / MDO

2

Delete email from all mailboxes

Threat Explorer - Soft Delete

3

Add domain to block list

MDO Tenant Allow/Block List

4

Submit to Microsoft

Report as phishing

5

Alert targeted users

Direct communication

6

Update email rules

Transport rules if needed

Account Compromise Confirmed

Step
Action
Tool/Method

1

Reset password immediately

Entra ID / AD

2

Revoke all sessions

Revoke-MgUserSignInSession

3

Remove malicious inbox rules

Exchange Admin / PowerShell

4

Disable mail forwarding

Exchange Admin

5

Revoke OAuth app consents

Entra ID Enterprise Apps

6

Enable/Reset MFA

Entra ID

7

Review sent items

Search for fraudulent emails

8

Notify recipients of fraudulent emails

Direct contact

9

Block attacker IPs

Conditional Access

10

Monitor for re-compromise

Enhanced monitoring

Financial Fraud Occurred

Step
Action
Timeline

1

Contact bank immediately

Within minutes

2

Request wire recall

ASAP (< 24 hours critical)

3

Preserve all evidence

Immediately

4

File IC3 complaint

Same day

5

Notify cyber insurance

Same day

6

Engage law enforcement

If significant amount

7

Document everything

Ongoing

PowerShell Remediation Commands

Account Containment

Remove Malicious Inbox Rules

Remove OAuth App Consents

Purge Malicious Emails

Block Sender Domain


Quick Reference Cards

BEC Red Flags Checklist

Email Content Red Flags

  • [ ] Urgent or time-sensitive request

  • [ ] Request to bypass normal procedures

  • [ ] Request for secrecy ("don't tell anyone")

  • [ ] Changed payment/banking details

  • [ ] Gift card purchase request

  • [ ] W-2 or employee data request

  • [ ] Unusual sender for request type

  • [ ] Grammar/spelling inconsistent with sender

  • [ ] Generic greeting instead of personal

Technical Red Flags

  • [ ] External sender with internal display name

  • [ ] Reply-to differs from sender address

  • [ ] Newly registered domain (< 30 days)

  • [ ] Look-alike/typosquatted domain

  • [ ] Failed SPF/DKIM/DMARC

  • [ ] Sent from free email provider

  • [ ] Embedded links to credential harvest

  • [ ] Attachment with macro/script

Account Red Flags

  • [ ] Sign-in from new location

  • [ ] Impossible travel detected

  • [ ] New inbox rules created

  • [ ] Mail forwarding enabled

  • [ ] OAuth app with mail permissions

  • [ ] Legacy protocol authentication

  • [ ] Bulk email deletions

  • [ ] Off-hours activity

Domain Analysis Quick Reference

Check
Tool/Method
What to Look For

Domain Age

WHOIS lookup

< 30 days = suspicious

Registration

WHOIS

Privacy protection, unusual registrar

Similarity

Visual comparison

Typos, homoglyphs, hyphens

MX Records

DNS lookup

Legitimate mail infrastructure

SPF/DKIM/DMARC

Email headers

Pass/Fail status

Reputation

VirusTotal, URLVoid

Known malicious indicators

SSL Certificate

Browser/SSLLabs

Valid cert, matches domain

Email Header Analysis

Header
What to Check

From:

Display name vs. actual address

Reply-To:

Matches From? Different domain?

Return-Path:

Envelope sender, should match

Received:

Mail server path, originating IP

Authentication-Results:

SPF, DKIM, DMARC pass/fail

X-Originating-IP:

Sender's IP address

Message-ID:

Domain should match sender

X-MS-Exchange-*

Microsoft-specific headers

Common BEC Phrases

Category
Example Phrases

Urgency

"ASAP", "urgent matter", "time-sensitive", "need this today"

Secrecy

"keep this confidential", "between us", "don't discuss with others"

Authority

"CEO approved", "I've already authorized", "board decision"

Unavailability

"I'm in a meeting", "traveling", "can't talk now"

Process Bypass

"skip normal process", "exception this time", "I'll approve later"

Financial

"wire transfer", "updated bank details", "new account"


Escalation Matrix

Severity Classification

Severity
Criteria
Response Time

🔴 Critical

Wire transfer sent, active ATO with ongoing fraud, multiple executives compromised

Immediate - 15 min

🟠 High

Wire transfer requested (not sent), confirmed ATO, finance team targeted

30 min - 1 hour

🟡 Medium

BEC attempt blocked, suspicious account activity, single user targeted

4 hours

🟢 Low

Obvious spam/phishing, blocked by filters, no user interaction

Next business day

Escalation Triggers

Condition
Escalation Level

Wire transfer completed

DFIR + Legal + Finance + CISO

Wire transfer pending

Tier 2 SOC + Finance (urgent)

Executive account compromised

DFIR + Tier 2 SOC + CISO

Multiple accounts compromised

DFIR + Tier 2 SOC

Vendor compromise suspected

Tier 2 SOC + Procurement

Data exfiltration (W-2, PII)

DFIR + Legal + HR + Privacy

> $50,000 potential exposure

CISO + Legal + Finance

External Notifications

Scenario
Notify
Timeline

Wire fraud > $50,000

FBI IC3, Local FBI field office

Immediately

Any wire fraud

Bank fraud department

Immediately

Wire fraud

Cyber insurance carrier

Within 24 hours

Data breach (PII)

Legal for regulatory assessment

Within 24 hours

Vendor compromise

Affected vendor

After internal assessment

Customer impact

Affected customers

Per legal/regulatory requirements


MITRE ATT&CK Mapping

Initial Access

Technique
ID
Description
Detection

Phishing: Spearphishing Attachment

T1566.001

Malicious attachment to gain access

EmailAttachmentInfo, MDO alerts

Phishing: Spearphishing Link

T1566.002

Malicious link to credential harvest

EmailUrlInfo, UrlClickEvents

Phishing: Spearphishing via Service

T1566.003

Via LinkedIn, social media

User reports

Valid Accounts: Cloud Accounts

T1078.004

Compromised cloud credentials

SigninLogs anomalies

Persistence

Technique
ID
Description
Detection

Account Manipulation: Email Forwarding

T1098.002

Auto-forward to external

OfficeActivity, CloudAppEvents

Account Manipulation: Additional Cloud Roles

T1098.003

Grant additional permissions

AuditLogs

Office Application Startup: Outlook Rules

T1137.005

Malicious inbox rules

CloudAppEvents (New-InboxRule)

Collection

Technique
ID
Description
Detection

Email Collection: Local Email Collection

T1114.001

Export mailbox locally

OfficeActivity (Export)

Email Collection: Remote Email Collection

T1114.002

Access via compromised account

MailItemsAccessed

Email Collection: Email Forwarding Rule

T1114.003

Forward to attacker

Inbox rules with forward

Impact

Technique
ID
Description
Detection

Financial Theft

T1657

Wire fraud, invoice manipulation

User reports, email content analysis

Relevant Reconnaissance

Technique
ID
Description
Detection

Gather Victim Org Information

T1591

Research organization structure

N/A (external)

Gather Victim Identity Information: Email Addresses

T1589.002

Harvest email addresses

N/A (external)

Search Open Websites/Domains

T1593

Find org info publicly

N/A (external)


Prevention & Hardening

Email Security Configuration

DMARC Implementation

DMARC Policy
Description
Recommendation

p=none

Monitor only

Initial deployment

p=quarantine

Send to spam

Intermediate

p=reject

Block delivery

Production

Transport Rules for BEC Protection

Defender for Office 365 Configuration

Feature
Setting
Purpose

Anti-phishing

Enable impersonation protection

Protect executives/VIPs

Anti-phishing

Enable mailbox intelligence

Learn user patterns

Safe Links

Enable URL rewriting

Protect against malicious links

Safe Attachments

Enable dynamic delivery

Scan attachments

User reported

Enable report button

Easy user reporting

User Awareness Checklist

Training Topics

  • [ ] What is BEC and why it's dangerous

  • [ ] Recognising suspicious email characteristics

  • [ ] Verifying financial requests out-of-band

  • [ ] Reporting suspicious emails properly

  • [ ] Never sharing credentials via email

  • [ ] Recognising urgency manipulation

Verification Procedures

Request Type
Verification Method

Wire transfer

Phone call to known number

Bank account change

In-person or video verification

Gift card purchase

Phone call to requester

W-2/Tax data

HR verification

Password/Credential

Never provide via email

Large purchases

Multi-person approval


Appendix: Investigation Commands

Email Header Analysis

Mailbox Forensics

OAuth App Investigation

Evidence Preservation

Bulk User Analysis


BEC attacks represent the highest financial risk category in cybercrime. Time is critical when wire transfers are involved. Always escalate potential wire fraud immediately—banks have limited windows to recall transfers (typically 24-48 hours, sometimes less).

Document everything meticulously for potential law enforcement involvement and insurance claims.

Last updated