Business Email Compromise (BEC) Investigation Runbook
SOC & DFIR Operations Guide
Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access
Overview & Scope
This runbook provides standardised procedures for investigating Business Email Compromise (BEC) attacks across the Microsoft 365 environment. BEC attacks are sophisticated social engineering schemes that exploit email to defraud organisations, often resulting in significant financial losses and data breaches.
What is Business Email Compromise?
BEC is a type of cybercrime where attackers use email fraud to target organisations. Unlike traditional phishing, BEC attacks are highly targeted, well-researched, and often involve impersonating trusted parties or compromising legitimate email accounts.
Key Statistics:
BEC accounts for the largest financial losses in cybercrime
Often no malware involved - relies on social engineering
Targets finance, HR, executives, and legal departments
BEC Attack Categories
By Attack Type
CEO Fraud
Impersonation of executive requesting urgent wire transfer
Finance team
Critical
Account Compromise
Takeover of legitimate email account
Any employee
High
Invoice Fraud
Fake or modified invoices from "vendors"
Accounts Payable
Critical
Vendor Impersonation
Impersonating suppliers/partners
Procurement, Finance
High
Attorney Impersonation
Fake legal requests requiring urgent action
Executives, Finance
High
Data Theft
Targeting HR/Finance for W-2s, PII, payroll data
HR, Payroll
High
Gift Card Scam
Request to purchase gift cards
Any employee
Medium
Payroll Diversion
Request to change direct deposit information
HR, Payroll
High
By Compromise Method
Spoofing
Forging sender address to appear legitimate
Low-Medium
Look-alike Domains
Using domains similar to legitimate ones (typosquatting)
Medium
Display Name Deception
Matching display name but different email address
Low
Account Takeover (ATO)
Compromising actual email account
High
Mailbox Rule Abuse
Creating rules to hide attacker activity
High
Reply-Chain Hijacking
Inserting into existing email conversations
Very High
Compromised Vendor
Using actually compromised third-party accounts
Very High
BEC Attack Lifecycle
Detection Sources & Data Mapping
Log Sources Matrix
Defender for Office
EmailEvents
Email metadata, delivery status
Defender for Office
EmailAttachmentInfo
Attachment analysis
Defender for Office
EmailUrlInfo
URLs in emails
Defender for Office
EmailPostDeliveryEvents
Post-delivery actions (ZAP)
Defender for Office
UrlClickEvents
User URL clicks
Exchange Online
OfficeActivity
Mailbox operations, rules
Exchange Online
CloudAppEvents
Mail send, forwarding
Entra ID
SigninLogs
Account access patterns
Entra ID
AuditLogs
Account changes
Entra ID
AADNonInteractiveUserSignInLogs
App-based sign-ins
Entra ID
RiskyUsers, RiskySignIns
Identity Protection alerts
Sentinel
SecurityAlert
Correlated BEC alerts
Sentinel
ThreatIntelligenceIndicator
Known BEC IOCs
Critical Detection Indicators
Email-Level Indicators
External sender with internal display name
Spoofing executive names
High
Look-alike domain
Typosquatted or similar domain
High
Reply-to mismatch
Reply address differs from sender
High
First-time sender
Never communicated before
Medium
Urgent financial request
Wire transfer, gift cards
Critical
Changed banking details
New account information
Critical
External forwarding rule
Mail forwarded outside org
Critical
Unusual sending patterns
Off-hours, unusual recipients
Medium
Account Compromise Indicators
Impossible travel
Sign-ins from distant locations
High
New inbox rules
Especially delete/forward rules
Critical
Suspicious sign-in properties
New device, browser, location
Medium
Mail forwarding changes
SMTP forwarding added
Critical
Delegate access added
New mailbox permissions
High
Bulk email operations
Mass delete, forward, export
High
OAuth app consent
New app with mail permissions
High
Legacy protocol sign-in
IMAP/POP3 authentication
High
Behavioral Indicators
Urgency language
"ASAP", "urgent", "confidential"
Medium
Authority assertion
"CEO approved", "don't tell anyone"
High
Process bypass requests
"Skip normal approval"
Critical
Gift card requests
Purchase and send codes
High
Banking change requests
New wire instructions
Critical
W-2/Tax form requests
Bulk PII requests
High
Unusual payment amounts
Outside normal ranges
Medium
Investigation Workflows
BEC Alert Triage
Objective: Quickly assess if a reported email is a BEC attempt and determine if any action has been taken.
Step 1: Initial Assessment
Identify the reported email (subject, sender, recipient, time)
Determine alert source (user report, automated detection, MDO)
Check if email was delivered or blocked
Assess the request type (wire transfer, gift cards, data)
Determine urgency based on potential financial impact
Step 2: Email Analysis
Review email headers for spoofing indicators
Check sender domain reputation and age
Analyze display name vs. actual email address
Review reply-to address configuration
Check for look-alike domain usage
Examine email content for social engineering tactics
Step 3: Recipient Impact Assessment
Identify all recipients of the email
Check if any recipients replied or clicked links
Review any attachments opened
Determine if any actions were taken (wire sent, etc.)
Contact recipients to verify no action taken
Step 4: Classification
External Impersonation
Spoofed/look-alike domain
Block domain, warn users
Account Compromise
Sent from legitimate internal account
Contain account, full investigation
Vendor Compromise
From actual compromised vendor
Contact vendor, block sender
False Positive
Legitimate email incorrectly flagged
Whitelist, close alert
Account Takeover (ATO) Investigation
Objective: Investigate suspected email account compromise used for BEC.
Step 1: Confirm Compromise
Review sign-in logs for anomalies
Check for impossible travel scenarios
Look for new device/browser/location sign-ins
Review MFA challenge results
Check Identity Protection risk scores
Step 2: Assess Mailbox Activity
Query mailbox audit logs for suspicious operations
Check for inbox rule creation/modification
Review sent items for unauthorised emails
Check deleted items for evidence destruction
Review mail forwarding configuration
Step 3: Identify Attacker Actions
Map timeline of unauthorised access
Identify emails sent by attacker
Document inbox rules created
Check for OAuth app consents
Review delegate access changes
Step 4: Determine Impact
List all recipients of fraudulent emails
Check if financial requests were made
Identify any data exfiltrated
Review if other accounts were targeted
Assess vendor/partner notification needs
Step 5: Containment
Reset user password immediately
Revoke all active sessions
Remove malicious inbox rules
Disable mail forwarding
Revoke suspicious OAuth apps
Enable/verify MFA
Block attacker IPs if identified
Invoice/Payment Fraud Investigation
Objective: Investigate BEC attempts targeting financial transactions.
Step 1: Email Trail Analysis
Locate the original fraudulent email
Identify the full email thread/conversation
Determine if legitimate thread was hijacked
Check for prior reconnaissance emails
Document all related communications
Step 2: Financial Request Analysis
Review the specific financial request
Compare requested account to known vendor details
Verify with vendor through separate channel
Check for recent "banking change" notifications
Review invoice details for inconsistencies
Step 3: Payment Status
Not Sent
Block payment, warn finance team
Pending
Cancel immediately, contact bank
Sent < 24 hours
Contact bank for recall
Sent > 24 hours
Contact bank, likely unrecoverable
Step 4: Source Identification
Determine if sender account was compromised
Check if vendor's email was compromised
Identify if domain spoofing was used
Review for man-in-the-middle indicators
Check for prior account access anomalies
Step 5: Recovery Actions
Contact bank immediately for wire recall
File IC3/FBI complaint for significant amounts
Preserve all evidence for law enforcement
Notify cyber insurance carrier
Document timeline for legal purposes
Executive Impersonation Investigation
Objective: Investigate BEC attempts impersonating executives.
Step 1: Impersonation Analysis
Identify the impersonated executive
Compare spoofed email to legitimate address
Check domain registration details
Review email authentication results (SPF/DKIM/DMARC)
Analyse writing style and signature
Step 2: Target Analysis
Identify all recipients targeted
Determine why these recipients were chosen
Check for prior reconnaissance against targets
Review if organisational info is publicly available
Assess social engineering sophistication
Step 3: Campaign Scope
Search for similar emails to other employees
Check for other impersonated executives
Look for variations in sender domains
Identify common infrastructure (IPs, domains)
Determine if targeted campaign or spray attack
Step 4: Response Coordination
Alert executive being impersonated
Send targeted warning to potential victims
Block identified spoofing infrastructure
Update email filters/rules
Consider organisation-wide alert
Inbox Rule Abuse Investigation
Objective: Investigate malicious inbox rules created by attackers.
Common Malicious Rule Patterns
Delete incoming
Hide responses about fraud
Rule deletes from specific senders
Move to RSS/Archive
Hide from primary view
Rule moves to obscure folders
Forward externally
Exfiltrate ongoing mail
Forwarding to external address
Delete sent items
Hide attacker's emails
Rule deletes sent mail
Mark as read
Prevent notification
Rule marks as read immediately
Auto-reply
Automate responses
Suspicious auto-reply content
Investigation Steps
Export all inbox rules
Query OfficeActivity for rule operations
Review current rules via PowerShell/Admin Center
Check for hidden/obfuscated rules
Analyse rule creation timeline
Correlate with sign-in anomalies
Check who created the rules
Identify source IP/device
Assess rule impact
Determine what mail was affected
Check forwarding destinations
Review deleted/moved messages
Remove malicious rules
Delete all attacker-created rules
Document rules for evidence
Monitor for re-creation
KQL Query Cheat Sheet
Email Analysis Queries
Suspicious External Senders with Internal Display Names
Look-alike Domain Detection
Reply-To Mismatch Detection
First-Time Sender to Executive
Emails with Financial Keywords
Account Compromise Detection
Sign-in Anomalies for Mail Users
Impossible Travel for Email Access
Legacy Protocol Authentication
New OAuth App Consent with Mail Permissions
Mailbox Activity Analysis
Inbox Rule Creation/Modification
Suspicious Inbox Rules (Forwarding/Deletion)
Email Forwarding Configuration Changes
Bulk Email Operations
Delegate/Permission Changes
Sent Email Analysis
Emails Sent to External Recipients
Emails with Wire Transfer Keywords (Sent)
Unusual Sending Patterns (Off-Hours)
Threat Intelligence Correlation
Known BEC Domains
Emails from Recently Registered Domains
Investigation Queries
Full Email Timeline for User
Identify All Emails in Fraudulent Thread
Cross-Reference Sign-ins with Email Activity
Response Actions & Remediation
Immediate Response Actions
BEC Email Reported (No Action Taken)
1
Block sender domain
Exchange Admin / MDO
2
Delete email from all mailboxes
Threat Explorer - Soft Delete
3
Add domain to block list
MDO Tenant Allow/Block List
4
Submit to Microsoft
Report as phishing
5
Alert targeted users
Direct communication
6
Update email rules
Transport rules if needed
Account Compromise Confirmed
1
Reset password immediately
Entra ID / AD
2
Revoke all sessions
Revoke-MgUserSignInSession
3
Remove malicious inbox rules
Exchange Admin / PowerShell
4
Disable mail forwarding
Exchange Admin
5
Revoke OAuth app consents
Entra ID Enterprise Apps
6
Enable/Reset MFA
Entra ID
7
Review sent items
Search for fraudulent emails
8
Notify recipients of fraudulent emails
Direct contact
9
Block attacker IPs
Conditional Access
10
Monitor for re-compromise
Enhanced monitoring
Financial Fraud Occurred
1
Contact bank immediately
Within minutes
2
Request wire recall
ASAP (< 24 hours critical)
3
Preserve all evidence
Immediately
4
File IC3 complaint
Same day
5
Notify cyber insurance
Same day
6
Engage law enforcement
If significant amount
7
Document everything
Ongoing
PowerShell Remediation Commands
Account Containment
Remove Malicious Inbox Rules
Remove OAuth App Consents
Purge Malicious Emails
Block Sender Domain
Quick Reference Cards
BEC Red Flags Checklist
Email Content Red Flags
[ ] Urgent or time-sensitive request
[ ] Request to bypass normal procedures
[ ] Request for secrecy ("don't tell anyone")
[ ] Changed payment/banking details
[ ] Gift card purchase request
[ ] W-2 or employee data request
[ ] Unusual sender for request type
[ ] Grammar/spelling inconsistent with sender
[ ] Generic greeting instead of personal
Technical Red Flags
[ ] External sender with internal display name
[ ] Reply-to differs from sender address
[ ] Newly registered domain (< 30 days)
[ ] Look-alike/typosquatted domain
[ ] Failed SPF/DKIM/DMARC
[ ] Sent from free email provider
[ ] Embedded links to credential harvest
[ ] Attachment with macro/script
Account Red Flags
[ ] Sign-in from new location
[ ] Impossible travel detected
[ ] New inbox rules created
[ ] Mail forwarding enabled
[ ] OAuth app with mail permissions
[ ] Legacy protocol authentication
[ ] Bulk email deletions
[ ] Off-hours activity
Domain Analysis Quick Reference
Domain Age
WHOIS lookup
< 30 days = suspicious
Registration
WHOIS
Privacy protection, unusual registrar
Similarity
Visual comparison
Typos, homoglyphs, hyphens
MX Records
DNS lookup
Legitimate mail infrastructure
SPF/DKIM/DMARC
Email headers
Pass/Fail status
Reputation
VirusTotal, URLVoid
Known malicious indicators
SSL Certificate
Browser/SSLLabs
Valid cert, matches domain
Email Header Analysis
From:
Display name vs. actual address
Reply-To:
Matches From? Different domain?
Return-Path:
Envelope sender, should match
Received:
Mail server path, originating IP
Authentication-Results:
SPF, DKIM, DMARC pass/fail
X-Originating-IP:
Sender's IP address
Message-ID:
Domain should match sender
X-MS-Exchange-*
Microsoft-specific headers
Common BEC Phrases
Urgency
"ASAP", "urgent matter", "time-sensitive", "need this today"
Secrecy
"keep this confidential", "between us", "don't discuss with others"
Authority
"CEO approved", "I've already authorized", "board decision"
Unavailability
"I'm in a meeting", "traveling", "can't talk now"
Process Bypass
"skip normal process", "exception this time", "I'll approve later"
Financial
"wire transfer", "updated bank details", "new account"
Escalation Matrix
Severity Classification
🔴 Critical
Wire transfer sent, active ATO with ongoing fraud, multiple executives compromised
Immediate - 15 min
🟠 High
Wire transfer requested (not sent), confirmed ATO, finance team targeted
30 min - 1 hour
🟡 Medium
BEC attempt blocked, suspicious account activity, single user targeted
4 hours
🟢 Low
Obvious spam/phishing, blocked by filters, no user interaction
Next business day
Escalation Triggers
Wire transfer completed
DFIR + Legal + Finance + CISO
Wire transfer pending
Tier 2 SOC + Finance (urgent)
Executive account compromised
DFIR + Tier 2 SOC + CISO
Multiple accounts compromised
DFIR + Tier 2 SOC
Vendor compromise suspected
Tier 2 SOC + Procurement
Data exfiltration (W-2, PII)
DFIR + Legal + HR + Privacy
> $50,000 potential exposure
CISO + Legal + Finance
External Notifications
Wire fraud > $50,000
FBI IC3, Local FBI field office
Immediately
Any wire fraud
Bank fraud department
Immediately
Wire fraud
Cyber insurance carrier
Within 24 hours
Data breach (PII)
Legal for regulatory assessment
Within 24 hours
Vendor compromise
Affected vendor
After internal assessment
Customer impact
Affected customers
Per legal/regulatory requirements
MITRE ATT&CK Mapping
Initial Access
Phishing: Spearphishing Attachment
T1566.001
Malicious attachment to gain access
EmailAttachmentInfo, MDO alerts
Phishing: Spearphishing Link
T1566.002
Malicious link to credential harvest
EmailUrlInfo, UrlClickEvents
Phishing: Spearphishing via Service
T1566.003
Via LinkedIn, social media
User reports
Valid Accounts: Cloud Accounts
T1078.004
Compromised cloud credentials
SigninLogs anomalies
Persistence
Account Manipulation: Email Forwarding
T1098.002
Auto-forward to external
OfficeActivity, CloudAppEvents
Account Manipulation: Additional Cloud Roles
T1098.003
Grant additional permissions
AuditLogs
Office Application Startup: Outlook Rules
T1137.005
Malicious inbox rules
CloudAppEvents (New-InboxRule)
Collection
Email Collection: Local Email Collection
T1114.001
Export mailbox locally
OfficeActivity (Export)
Email Collection: Remote Email Collection
T1114.002
Access via compromised account
MailItemsAccessed
Email Collection: Email Forwarding Rule
T1114.003
Forward to attacker
Inbox rules with forward
Impact
Financial Theft
T1657
Wire fraud, invoice manipulation
User reports, email content analysis
Relevant Reconnaissance
Gather Victim Org Information
T1591
Research organization structure
N/A (external)
Gather Victim Identity Information: Email Addresses
T1589.002
Harvest email addresses
N/A (external)
Search Open Websites/Domains
T1593
Find org info publicly
N/A (external)
Prevention & Hardening
Email Security Configuration
DMARC Implementation
p=none
Monitor only
Initial deployment
p=quarantine
Send to spam
Intermediate
p=reject
Block delivery
Production
Transport Rules for BEC Protection
Defender for Office 365 Configuration
Anti-phishing
Enable impersonation protection
Protect executives/VIPs
Anti-phishing
Enable mailbox intelligence
Learn user patterns
Safe Links
Enable URL rewriting
Protect against malicious links
Safe Attachments
Enable dynamic delivery
Scan attachments
User reported
Enable report button
Easy user reporting
User Awareness Checklist
Training Topics
[ ] What is BEC and why it's dangerous
[ ] Recognising suspicious email characteristics
[ ] Verifying financial requests out-of-band
[ ] Reporting suspicious emails properly
[ ] Never sharing credentials via email
[ ] Recognising urgency manipulation
Verification Procedures
Wire transfer
Phone call to known number
Bank account change
In-person or video verification
Gift card purchase
Phone call to requester
W-2/Tax data
HR verification
Password/Credential
Never provide via email
Large purchases
Multi-person approval
Appendix: Investigation Commands
Email Header Analysis
Mailbox Forensics
OAuth App Investigation
Evidence Preservation
Bulk User Analysis
BEC attacks represent the highest financial risk category in cybercrime. Time is critical when wire transfers are involved. Always escalate potential wire fraud immediately—banks have limited windows to recall transfers (typically 24-48 hours, sometimes less).
Document everything meticulously for potential law enforcement involvement and insurance claims.
Last updated