CEO Fraud (Executive Spoofing)
The threat actor impersonates a high-ranking executive (e.g., CEO, CFO) to order an urgent, highly confidential wire transfer to an employee in the finance department.
BEC attacks generally fall into three distinct operational scenarios. Analysts must quickly identify which paradigm they are investigating.
CEO Fraud (Executive Spoofing)
The threat actor impersonates a high-ranking executive (e.g., CEO, CFO) to order an urgent, highly confidential wire transfer to an employee in the finance department.
Email Account Compromise (EAC)
The attacker gains actual control of an employee’s mailbox. They use the legitimate infrastructure to communicate internally or intercept ongoing vendor conversations.
Invoice Fraud (Vendor Compromise)
The attacker impersonates a legitimate supplier and submits a forged invoice or a formal request to update bank routing details to an attacker-controlled account.
The primary objective of the initial triage is to determine the technical nature of the attack: Is this a case of external domain spoofing, or has an internal account been actively compromised?
.eml or .msg sample.Authentication-Results header.
dmarc=fail or softfail.
dmarc=pass and spf=pass.
If the authentication checks pass (Result B), analysts must assume the threat actor possesses valid credentials or session tokens for the sender’s account.
The investigation must pivot to the Identity Provider (IdP) logs to confirm unauthorized access.
Once inside the mailbox, BEC actors typically establish persistence and reconnaissance mechanisms. The Microsoft 365 Unified Audit Log (UAL) is the primary hunting ground.
New-InboxRule to:
MailItemsAccessed events to determine if the attacker read sensitive historical emails to learn the company’s billing procedures before striking.Utilize Exchange Online Message Trace to determine if the compromised account was weaponized to send internal phishing emails to other employees or external partners, propagating the breach.
Leverage the following KQL queries within Microsoft Defender XDR / Sentinel to rapidly identify BEC infrastructure manipulation.
// Detect the creation of suspicious inbox rules often used in BECCloudAppEvents| where Application == "Exchange Online"| where ActionType == "New-InboxRule" or ActionType == "Set-InboxRule"| extend RuleName = tostring(RawEventData.Name)| extend ForwardTo = tostring(RawEventData.ForwardTo)| extend DeleteMessage = tostring(RawEventData.DeleteMessage)// Filter for rules that forward externally or delete messages| where isnotempty(ForwardTo) or DeleteMessage == "True"| project TimeGenerated, AccountObjectId, RuleName, ForwardTo, DeleteMessage, IPAddress| sort by TimeGenerated desc// Hunt for successful sign-ins from unexpected geographic locationsAADSignInEventsBeta| where ErrorCode == 0 // Successful sign-in| where AccountUpn == "suspected.user@yourcompany.com"// Example: Exclude known legitimate operating countries| where Country != "US" and Country != "FR"| project TimeGenerated, AccountUpn, IPAddress, Country, City, UserAgent, ClientAppUsed| sort by TimeGenerated desc