Business Email Compromise Detection Playbook
Introduction: The Need for Effective Business Email Compromise Detection Capabilities
Table of Contents
1. Initial Detection of Business Email Compromise
Query Option 1: Identify Suspicious Email Activity
Query Option 2: Detect Unusual Login Behavior
Query Option 3: Monitor Email Rule Modifications
2. Account Compromise Indicators
Query Option 1: Failed Login Attempts and Credential Abuse
Query Option 2: Unauthorised Email Forwarding Rules
Query Option 3: Unusual Multi-Factor Authentication (MFA) Events
3. Suspicious Financial Transactions
Query Option 1: Monitor Financial Email Conversations
Query Option 2: Detect Fraudulent Payment Requests
Query Option 3: Identify Suspicious Vendor Email Changes
4. Data Exfiltration Indicators
Query Option 1: Large Volume Email Forwarding
Query Option 2: Monitor File Attachments with Sensitive Data
Query Option 3: Detect Unusual Data Transfers to External Recipients
5. Incident Response and Containment
Query Option 1: Isolate Compromised Accounts
Query Option 2: Correlate Indicators of Compromise (IoCs)
6. Conclusion
Last updated