Business Email Compromise (BEC) Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
What is Business Email Compromise?
BEC Attack Categories
By Attack Type
Type
Description
Target
Financial Risk
By Compromise Method
Method
Description
Detection Difficulty
BEC Attack Lifecycle
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
BEC-Relevant Data
Critical Detection Indicators
Email-Level Indicators
Indicator
Description
Risk Level
Account Compromise Indicators
Indicator
Description
Risk Level
Behavioral Indicators
Indicator
Description
Risk Level
Investigation Workflows
BEC Alert Triage
Step 1: Initial Assessment
Step 2: Email Analysis
Step 3: Recipient Impact Assessment
Step 4: Classification
Classification
Criteria
Action
Account Takeover (ATO) Investigation
Step 1: Confirm Compromise
Step 2: Assess Mailbox Activity
Step 3: Identify Attacker Actions
Step 4: Determine Impact
Step 5: Containment
Invoice/Payment Fraud Investigation
Step 1: Email Trail Analysis
Step 2: Financial Request Analysis
Step 3: Payment Status
Status
Immediate Action
Step 4: Source Identification
Step 5: Recovery Actions
Executive Impersonation Investigation
Step 1: Impersonation Analysis
Step 2: Target Analysis
Step 3: Campaign Scope
Step 4: Response Coordination
Inbox Rule Abuse Investigation
Common Malicious Rule Patterns
Rule Type
Purpose
Detection
Investigation Steps
KQL Query Cheat Sheet
Email Analysis Queries
Suspicious External Senders with Internal Display Names
Look-alike Domain Detection
Reply-To Mismatch Detection
First-Time Sender to Executive
Emails with Financial Keywords
Account Compromise Detection
Sign-in Anomalies for Mail Users
Impossible Travel for Email Access
Legacy Protocol Authentication
New OAuth App Consent with Mail Permissions
Mailbox Activity Analysis
Inbox Rule Creation/Modification
Suspicious Inbox Rules (Forwarding/Deletion)
Email Forwarding Configuration Changes
Bulk Email Operations
Delegate/Permission Changes
Sent Email Analysis
Emails Sent to External Recipients
Emails with Wire Transfer Keywords (Sent)
Unusual Sending Patterns (Off-Hours)
Threat Intelligence Correlation
Known BEC Domains
Emails from Recently Registered Domains
Investigation Queries
Full Email Timeline for User
Identify All Emails in Fraudulent Thread
Cross-Reference Sign-ins with Email Activity
Response Actions & Remediation
Immediate Response Actions
BEC Email Reported (No Action Taken)
Step
Action
Tool/Method
Account Compromise Confirmed
Step
Action
Tool/Method
Financial Fraud Occurred
Step
Action
Timeline
PowerShell Remediation Commands
Account Containment
Remove Malicious Inbox Rules
Remove OAuth App Consents
Purge Malicious Emails
Block Sender Domain
Quick Reference Cards
BEC Red Flags Checklist
Email Content Red Flags
Technical Red Flags
Account Red Flags
Domain Analysis Quick Reference
Check
Tool/Method
What to Look For
Email Header Analysis
Header
What to Check
Common BEC Phrases
Category
Example Phrases
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Triggers
Condition
Escalation Level
External Notifications
Scenario
Notify
Timeline
MITRE ATT&CK Mapping
Initial Access
Technique
ID
Description
Detection
Persistence
Technique
ID
Description
Detection
Collection
Technique
ID
Description
Detection
Impact
Technique
ID
Description
Detection
Relevant Reconnaissance
Technique
ID
Description
Detection
Prevention & Hardening
Email Security Configuration
DMARC Implementation
DMARC Policy
Description
Recommendation
Transport Rules for BEC Protection
Defender for Office 365 Configuration
Feature
Setting
Purpose
User Awareness Checklist
Training Topics
Verification Procedures
Request Type
Verification Method
Appendix: Investigation Commands
Email Header Analysis
Mailbox Forensics
OAuth App Investigation
Evidence Preservation
Bulk User Analysis
Last updated