Sitemap
Dark Roast Security

Dark Roast Security’s mission is to inspire, educate, and share ideas about InfoSec. Follow to join our community!

Member-only story

Featured

Two Months Undetected: A BEC Scheme Lurking in Plain Sight

Lessons from a Cyber Threat Defense Manager

4 min readApr 2, 2025

--

image from istockphoto.com

After what seemed like weeks of non-stop meetings, early mornings, late nights, and no shortage of investigations, today was supposed to be a quiet day to catch up on email and get some much-needed tasks started…I should’ve known that wouldn’t pan out as I expected.

I had been running some errands, taking advantage of the open morning schedule to get a few personal things done (perks of a flexible work-from-home culture), when I received a message from a member of my team. We’d received a report from an employee that they’d learned of a business email compromise (BEC) situation involving a partner organization.

With the email threads provided to us, we were able to quickly ascertain that yes, our employees had been unknowingly communicating with a threat actor via a compromised email account.

The kicker? The account compromise had occurred in late January!

While the correspondence from the threat actor was sophisticated, a few red flags were missed:

  • The threat actor injected themselves into an existing email thread, but changed the Subject on their reply; this is a technique used alongside mailbox rule creation, where the individual creates rules…

--

--

Dark Roast Security
Dark Roast Security

Published in Dark Roast Security

Dark Roast Security’s mission is to inspire, educate, and share ideas about InfoSec. Follow to join our community!

Katlyn Gallo
Katlyn Gallo

Written by Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | Find me on Twitter & Instagram: @ktgblogstech

Responses (4)