Skip to main content
Medium difficultyPhishing & Social Engineering25-40 minutes
SIEMXDR

Business Email Compromise (BEC) Investigation

When financial staff receive urgent payment requests from executives or vendors, or when email rules are discovered forwarding messages to external accounts, investigate for Business Email Compromise. Check authentication logs for account takeover, review email rules for unauthorized forwarding, inspect payment request details for social engineering patterns, and trace the communication chain. BEC caused $2.9 billion in losses in 2023 according to the FBI IC3, making it the most financially damaging cybercrime category.

Overview

Business Email Compromise is a sophisticated social engineering attack where adversaries impersonate executives, vendors, or business partners to trick employees into transferring funds or sharing sensitive data. Unlike mass phishing, BEC is highly targeted and often involves actual account compromise rather than spoofed emails. Attackers may compromise an executive mailbox, monitor email threads for weeks, then inject themselves at the perfect moment, when a legitimate invoice is due or a wire transfer is in progress.

The FBI IC3 reported $2.9 billion in BEC losses in 2023 alone. Notable incidents include the Ubiquiti Networks $46.7M BEC fraud (2015) and the Toyota Boshoku $37M BEC (2019). This playbook covers both account-takeover BEC and impersonation-based BEC investigation workflows.

When You See This

  1. 1

    Finance department reports an unusual payment request from an executive with urgency language

  2. 2

    Email gateway flags an inbound message with display name matching a C-suite executive but from an external domain

  3. 3

    Mailbox audit logs show creation of forwarding rules to external email addresses

  4. 4

    A vendor reports receiving payment change requests they did not send

  5. 5

    Authentication logs show an executive account accessed from an unusual location or device

Investigation Steps

  1. 1

    Determine if the executive account is compromised

    Check authentication logs for the impersonated executive account. Look for logins from unusual locations, devices, or IP addresses. Review mailbox audit logs for unauthorized access, rule creation, or message deletion. If the account is compromised, this is account-takeover BEC; the most dangerous variant because the emails come from a legitimate address.

    SIEM
    index=o365 OR index=exchange user="executive@company.com" operation IN ("New-InboxRule", "Set-InboxRule", "UpdateInboxRules") | table _time, operation, parameters, src_ip
    index=auth user="executive@company.com" | stats values(src_ip) as ips, values(user_agent) as agents, values(City) as locations by action | sort -_time

    Decision Point

    If: Unauthorized access to the executive account is confirmed

    Yes → Account-takeover BEC. Immediately reset password, revoke sessions, remove unauthorized rules. Escalate. all emails sent from this account during the compromise window are suspect.

    No → Likely impersonation-based BEC using a spoofed or lookalike domain. Proceed to email header analysis.

  2. 2

    Analyze the fraudulent email headers and domain

    For impersonation BEC, examine the sending domain. Look for typosquatting (ceo@company-inc.com vs ceo@company.com), recently registered domains, and SPF/DKIM failures. Check WHOIS for the lookalike domain registration date and registrant.

    SIEM
    index=email sender_domain!="company.com" sender_display="*CEO Name*" | table _time, sender_address, sender_domain, recipient, subject, spf_result, dkim_result
  3. 3

    Review the financial request for social engineering markers

    Analyze the payment request content. BEC emails typically contain: urgency language, requests to change payment methods or bank details, instructions to keep the request confidential, and pressure to bypass normal approval processes. Compare against the actual vendor or executive communication patterns.

    SIEM
  4. 4

    Check for mail forwarding rules and persistence

    If the account was compromised, search for email forwarding rules that send copies of incoming mail to external addresses. Attackers use these to monitor communications even after the password is changed. Check for OAuth application consent grants that provide persistent mailbox access.

    SIEM
    index=o365 operation IN ("New-InboxRule", "Set-InboxRule") | where match(parameters, "ForwardTo|RedirectTo|ForwardAsAttachmentTo") | table _time, user, parameters, src_ip
  5. 5

    Contain, notify, and report

    If funds were transferred, immediately contact the receiving bank to attempt a recall. Notify law enforcement (FBI IC3 for US organizations). Remove unauthorized email rules. Block the attacker domain. Issue an internal advisory to finance staff about the attempted BEC. Document the complete communication chain for legal proceedings.

    SIEM

Common Mistakes

  1. 1

    Investigating only the phishing email without checking if the executive account itself was compromised

  2. 2

    Not searching for email forwarding rules that provide persistent access even after password reset

  3. 3

    Treating BEC as a simple phishing attempt; BEC often involves weeks of email thread monitoring before the attack

  4. 4

    Failing to contact the bank immediately when funds have been transferred; recall success rates drop dramatically after 24 hours

Escalation Criteria

  • Funds have been transferred to a fraudulent account

  • Executive mailbox compromise confirmed with unauthorized access over multiple days

  • Multiple BEC attempts targeting different executives or finance staff simultaneously

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including business email compromise (bec) investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

How much money do BEC attacks steal?
The FBI IC3 reported $2.9 billion in BEC losses in 2023, making it the most financially damaging cybercrime category, exceeding ransomware losses. Individual BEC incidents have stolen over $40 million (Ubiquiti Networks, Toyota Boshoku). The average BEC loss is approximately $125,000 per incident.
How is BEC different from regular phishing?
Regular phishing casts a wide net to steal credentials or install malware. BEC is highly targeted financial fraud; the attacker impersonates a specific executive or vendor to trick a specific employee into transferring money. BEC emails often contain no malicious links or attachments, making them harder for email security tools to detect.
How do I practice BEC investigations?
SOCSimulator includes BEC scenarios where you analyze compromised mailboxes, trace unauthorized email rules, and investigate financial fraud attempts. Build the investigation skills that prevent million-dollar losses. Start free forever.
Technique

Phishing (T1566) — Detection Training

Phishing is a social engineering technique where adversaries send fraudulent electronic messages to gain access to victi…

Read more
Technique

Valid Accounts (T1078) — Detection Training

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…

Read more
Technique

Email Collection (T1114) — Detection Training

Adversaries may target user email to collect sensitive information. Emails may contain sensitive data, including trade s…

Read more
Glossary

What is Phishing? — SOC Glossary

Phishing is a social engineering attack delivered via email, SMS, voice calls, or other channels that deceives recipient…

Read more
Glossary

What is Social Engineering? — SOC Glossary

Social engineering is the psychological manipulation of individuals into performing actions or revealing information tha…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Glossary

What is Alert Triage? — SOC Glossary

Alert triage is the structured process of reviewing, prioritizing, and investigating security alerts to determine their …

Read more
Career Path

SOC Analyst (Tier 1) Career Guide — Salary & Skills

Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Brute Force Attack Investigation — Investigation Playbook

When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying th…

Read more

We use cookies to improve your experience and measure usage. Learn more