Understanding Business Email Compromise (BEC)

The MITRE ATT&CK[1] framework defines BEC as a social engineering attack where threat actors use email to deceive businesses or individuals into authorising financial transactions or revealing sensitive information. These attacks leverage the trust within organisational processes, using impersonation and urgency to compel quick, unverified actions. In contrast to broad phishing campaigns, BEC attacks are precise, often based on extensive research about the organisation and its key personnel. A threat actor may impersonate a senior executive or trusted partner, pressuring the recipient to act without delay. The result is usually significant financial loss, such as unauthorised fund transfers, data theft, or rerouting of payments to fraudulent accounts.

Real-World Impacts

The FBI’s Internet Crime Report has documented BEC attacks, as having caused nearly $2.9 billion in losses in 2023, highlighting the substantial risk posed by these highly targeted attacks. Real-world cases, including incidents involving Scoular Co. in 2014, Puerto Rico’s Government in 2020, and the Treasure Island Charity, underscore the significant costs of BEC tactics. By exploiting trust and urgency, these attackers manipulate decision-makers and financial teams into taking costly actions with long-lasting effects.[2][3][4]

Abstract

Reliance Cyber Incident Response and XDR teams have recently observed a sophisticated wave of phishing attempts that slip past the M365 environment’s security controls and ultimately engage unsuspecting employees. Even within what are typically considered secure settings, these emails, flagged as phishing or spam, are enticing employees to interact with malicious content.

A particularly effective technique involves targeting publicly accessible generic email addresses, such as accounts@company.com, finance@company.com, or HR@company.com—addresses that often see a high volume of external interactions and are easy to guess for threat actors. During triage and full analysis, these generic accounts are frequently found to be an entry point for phishing attacks. Once in the system, phishing emails are forwarded internally, triggered by mailbox rules that re-route the malicious message to another private, internal mailbox. For instance, a phishing email initially delivered to accounts@company.com might be automatically forwarded to invoicing@company.com, allowing it to bypass additional scrutiny and reach new recipients.

Our teams have uncovered multiple cases where these forwarded emails initiate automated processes, slipping into ticketing systems that create service tickets based on email content. In environments where systems like Freshdesk and ZenDesk are employed, this automated ticket generation workflow can inadvertently escalate the phishing email’s reach within the organisation. Here, ticketing systems often assume a ‘safe’ environment, giving employees an unguarded view of the phishing link or attachment—a setup ripe for clicks.

In our recent analyses, the attackers managed to embed themselves within internal systems simply by taking advantage of these established workflows. Phishing emails often landed in the inbox or junk folders of various recipients, flagged as either spam or phish by M365 controls like Zero-hour Auto Purge (ZAP). But even though these security measures attempted to quarantine the threat, internal rules were triggered before full security actions could take effect. In this brief window, the phishing email’s content was forwarded, making its way into internal workflows and resulting in auto-generated tickets.

Observed Process

Despite M365’s robust protections, traditional security measures can be circumvented by internal email routing rules.

Email rules, including Exchange transport rules, are often executed immediately upon email receipt. While ZAP flags malicious emails, we’ve observed internal routing rules forward these emails to other mailboxes or external systems like Freshdesk before the security controls fully apply.

In the Unified Audit Log (UAL) output, the Tenant system override(s) attribute with the value Allowed by organization policy / Exchange transport rule indicates that the action taken on the email was permitted due to a policy or rule configured within the organisation’s Microsoft 365 tenant.

  • Exchange transport rule: This indicates that a transport rule (also known as a mail flow rule) configured in the organisation’s Exchange Online environment allowed the email. Transport rules are used to manage and modify email messages as they pass through the Exchange environment, and they can be set up to bypass filtering based on specific criteria, such as sender, recipient, or content.
    • The Latest delivery location and Original delivery location attributes relating to the value On-prem/external indicates that the email is forwarded to an external email system not managed by Microsoft 365, in this instance, Freshdesk.
  • The ZAP (Zero-hour Auto Purge) security control in Microsoft 365 is a feature designed to protect users from malicious emails that bypass initial filtering. It automatically removes (or “purges”) potentially harmful emails, such as phishing or malware-laden messages, from users’ inboxes after they have been delivered if they are later identified as threats.

Security Controls – Gaps In The Armour

  • M365 Marking, but Not Blocking: Although M365 flagged the emails as spam or phishing, internal routing systems allowed these flagged emails to continue through other channels. The emails bypassed traditional defences because of internal redirection rules, which let them enter the M365 accounts where the ticketing system would be initiated prior to them being flagged as malicious.
  • Inbound Email Flow: When an email is received by an M365 mailbox, it goes through a series of processing steps before it reaches the recipient’s inbox.
    • Initial Delivery: As soon as an email is received, it is subject to basic routing and filtering. Mailbox rules configured by the user are executed immediately based on predefined conditions.
    • Content Scanning (Anti-Spam, Anti-Phishing): After the initial routing, the email goes through more advanced security mechanisms, such as anti-spam and anti-phishing checks, which scan the content, attachments, and links to determine if the email is potentially malicious.
  • Execution at the Routing Stage: M365 email rules (such as inbox rules or transport rules) are processed early in the pipeline—often before more in-depth content scanning. These rules are based on easily identifiable characteristics, like sender address, subject line, or recipient, and they are applied immediately when an email is routed to a mailbox.
  • Ticketing Systems’ Automation Flaw: The ticketing system automation inadvertently escalated the phishing email’s legitimacy by creating a ticket, which could  then be view or acted upon by internal department members. Individuals can then click the phishing link, which, in cases observed by Reliance Cyber, led to a static malicious page hosted on a cloud platform. This ultimately redirected them to a fake Microsoft 365 login page, where individuals their credentials, believing it was necessary to view an invoice, HR or account document.

Exchange Online Protection

Exchange Online Protection (EOP) protects your organisation against spam, malware, phishing and other email threats. EOP is included in all Microsoft 365 organisations that have Exchange Online mailboxes.[5]

How it works

  1. Connection Filtering: Messages are initially filtered based on the sender’s reputation. Most spam is rejected at this stage.
  2. Malware Filtering: Messages are scanned for malware, and any detected are quarantined. By default, only administrators can access these quarantined items, but quarantine policies allow admin-defined user permissions.
  3. Policy Filtering: Messages are evaluated against custom mail flow rules (transport rules) that can trigger specific actions, such as notifying a manager of certain incoming messages.
    1. DLP Checks (for on-premises organisations with Exchange Enterprise CAL with Services licences): Microsoft Purview Data Loss Prevention applies additional security checks.
  4. Content Filtering: Anti-spam and anti-spoofing checks categorise messages as spam, phishing, or spoofed. Actions, such as quarantining or moving to Junk, can be configured based on the filtering results, with policies set to control user interaction with quarantined items.

Mitigation Strategies: Strengthening Defences

To prevent such attacks, organisations need a layered approach combining security, workflow adjustments, and employee training:

Review email forwarding rules and implement conditional access to limit email routing until after a full security check. This reduces the risk of flagged emails bypassing critical checks.[6]

Microsoft’s Safe Links and Safe Attachments provide continuous scanning of emails even after delivery, reducing the likelihood that malicious links or attachments are acted upon.[7]

Ticketing systems should be configured to flag or require manual review of any ticket generated from a flagged email. Integrating an additional security layer here would prevent phishing emails from being immediately accessible in internal workflows.

Microsoft 365 allows for Conditional Access rules that can delay or block email forwarding until an additional security check is completed. This approach would prevent flagged emails from automatically being routed to ticketing systems without further scrutiny.[8]


[1] MITRE ATT&CK T1586.002

[2] FBI Internet Crime Report

[3] AHA Report

[4] Business Email Compromise (BEC) Attacks

[5] Exchange Online Protection (EOP) overview – Microsoft Defender for Office 365 | Microsoft Learn

[6] Scenario Conditional mail routing in Exchange Online | Microsoft Learn

[7] Complete Safe Links overview for Microsoft Defender for Office 365 – Microsoft Defender for Office 365 | Microsoft Learn

[8] Getting started with defense in-depth configuration for email security – Microsoft Defender for Office 365 | Microsoft Learn