Incident Response Timeline – Business Email Compromise

Response Timeline

Business Email Compromise Time to detect: 19 minutes

In this real-world response timeline, we walk you through an email account takeover, a form of BEC, on a customer in the manufacturing industry, and how the Arctic Wolf Security Teams detected the attacker in only 19 minutes with the dedicated team of security experts investigating and alerting the customer in less than 10 minutes.

View Timeline Navigation

12:57 p.m.

Source: Adversary

Arctic Wolf Attacker icon Arctic Wolf Aurora Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

12:57 p.m.

5:23 am

Attack begins on [CUSTOMER] with attacker leveraging previously stolen [USER 01] credentials acquired via phishing email. Attacker pushes a Duo multi-factor authentication (MFA) request to [USER 01]. Not aware of the consequences, [USER 01] accepts the Duo MFA push from attacker.

The attacker uses the successful login to establish ActiveSync with [USER 01]'s mailbox.

The impact of email account takeover

Organizations rely on email to conduct business, communicate, share information and set meetings on a daily basis. Business email compromise (BEC) is an unsettlingly common method of attack for attackers and can have a huge impact on your business.

BEC attacks have already cost U.S. businesses at least $20 billion (USD) in losses from 2013 to the present. According to the Federal Bureau of Investigation, that number could easily be as high as $55 billion (USD) around the world.
12:58 p.m.
1 Minute Since Attack

12:58 p.m.

Source: Duo

Arctic Wolf Attacker icon Arctic Wolf Aurora Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

5:23 am

The Arctic Wolf AuroraTM Platform logs MFA successful for [USER 01] with Duo as the source.

The impact of email account takeover

83% of organizations experienced at least one instance of account takeover in the past year.
1:16 p.m.
19 Minutes Since Initial Activity

1:16 p.m.

Attacker Active

Arctic Wolf Attacker icon Arctic Wolf Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

Attacker opens existing calendar event for “Best Practices Training” and updates with their own information.

Attacker begins adding forward and delete rules to [USER 01] inbox.

1:16 p.m.
Aurora PlatformTM escalates incident after seeing rules being added and deleted on [USER 01] account.

1:16 p.m.

Active: Office 365 Logs

Arctic Wolf Attacker icon Arctic Wolf Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

1:18 p.m.
21 Minutes Since Attack

1:18 p.m. | Following Investigation

Investigation Begins

Arctic Wolf Attacker icon Arctic Wolf Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

The Arctic Wolf Triage Teams begins investigation into [USER 01] activity.

1 Minute Since Attack

1:22 p.m.

Ongoing Investigation

Arctic Wolf Attacker icon Arctic Wolf Aurora Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

1:22 p.m.

Attacker's Access

Phishing Icon

Attacker uploads phishing PDFs to OneDrive with intent to distribute emails to calendar invite attendees​.

Customer is alerted

1:25 p.m.

Begin Escalation

Arctic Wolf Attacker icon Arctic Wolf Aurora Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

1:25 p.m.
The Arctic Wolf Triage Team investigates and alerts [CUSTOMER] that [USER 01] has been compromised.
Arctic recommends [CUSTOMER] the account and forces a reset of credentials.
Begin Post-Incident Zone
1:25 p.m.
Less than 30 Minutes Since Attack

1:25 p.m.

Remediation

Arctic Wolf Attacker icon Arctic Wolf Platform icon Arctic Wolf Customer icon Arctic Wolf Triage icon Arctic Wolf CST icon

[CUSTOMER] confirms that [USER 01] has been compromised and disables the account.

The Arctic Wolf Concierge Security® Team works with the customer to check log data for any customer users accessing phishing PDF. CST confirms remediation took place before any users accessed the PDF. CST assists customer in remediating actions taken by the adversary.

Next, the security journey continues

Attack Timeline:

Security journey

with our concierge security team

The Arctic Wolf Concierge Security® Team works with customer to check log data for any customer users accessing phishing PDF. CST confirms remediation took place before any users accessed the PDF. CST assists customer in remediating actions taken by the adversary.

The Arctic Wolf Concierge Security Team provides your team with coverage, security operations expertise, and strategically tailored security recommendations to continuously improve your overall posture.

Real-World Examples

BEC Fraud Comes In Many Forms

In the example above, credentials were stolen via phishing email. Do you think you or your company’s employees could spot the various types of email compromise methods that have been used in different attacks?

Account Compromise icon

Account Compromise

In this classic form (which also gives rise to the BEC synonym email account compromise, or EAC), rather than simply masquerading as a trusted email account, an attacker succeeds in gaining access to an entire legitimate email account and uses it to execute the scam by sending and replying to emails from the hijacked account, sometimes using filtering tools and other techniques to prevent the real account holder from noticing the activity.
Data Theft icon

Data Theft

An attacker targets HR and finance employees to obtain personal or sensitive information about individuals within the company, such as CEOs and executives. This data can then be leveraged to enable future cyber attacks.

In rarer instances, an attacker masquerading as a customer or vendor may ask a recipient (e.g., in a legal or technical role) to send intellectual property or other sensitive or proprietary information.

CEO Fraud Icon

CEO/Executive Fraud

An attacker masquerading
as the CEO or other
senior executive within
an organization emails an
individual with the authority
to transfer funds, requesting
a transfer to an account
controlled by the attacker.

Engagement icon

Attorney Impersonation

An attacker impersonates a lawyer or legal representative for the company and emails an employee requesting funds or sensitive data. Lower-level employees are commonly targeted through these types of BEC attacks.
Shopping cart icon

Product Theft

A relatively new twist, in which an attacker imitating a customer tricks an organization into selling (and shipping) a large quantity of product on credit.
False invoice icon

False-Invoice Scheme

An attacker posing as a known vendor or supplier emails an individual with the authority to transfer funds, transfer to an account controlled by the attacker.

The losses incurred from business email compromise attacks have increased *58% between 2020 and 2023.*View Source

In the new normal of hybrid wok environments, account takeover risk is more serious than ever.

We're here to help.

General Questions

1-888-272-8429

Additional Resources