A tale of Business Email Compromise

BEC attacks

Chapter 1, where we are asked to conduct an investigation

For reasons of NDAs and sheer consideration, we shall not be giving you all the details of the investigation. But we will try to make our case as complete and comprehensible as possible.

Chapter 2, where we test our initial assumptions

Chapter 3, where we assess the scale of the campaign

Chapter 4, where we map out what happened

Chapter 5, where we detail the geography of the campaign

Chapter 6, where we answer any remaining questions

Conclusion

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store