{"id":58246,"date":"2025-03-05T00:00:00","date_gmt":"2025-03-05T00:00:00","guid":{"rendered":"urn:uuid:bda21144-e6f1-939b-937b-1a8844d92521"},"modified":"2025-03-05T00:00:00","modified_gmt":"2025-03-05T00:00:00","slug":"from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/","title":{"rendered":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/DMARC-thumbnail:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/DMARC-thumbnail.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>In the second phase, the threat actor has fully inserted themselves to separate the conversations between the two companies. It is important to note that there are about 4-6 recipients in this running email thread, and the threat actor was gradually swapping out the recipients to an email account they can control.<\/p>\n<p>To seem legitimate, the \u201cFrom\u201d field of the email contained the intended recipient between Partner A or Partner B, but the \u201cReply-To\u201d was still the threat actor\u2019s email address \u2013 for both emails going to Partner A and Partner B, as well as Partner C. As for the email content, the threat actor mimicked either Partner A or Partner B, utilizing the same writing style (salutation, email footer, and choice of words), often keeping it short.<\/p>\n<p>Several BEC emails were sent through the third-party email server. The said server seems to have an insecure configuration, causing the email to pass the Sender Policy Framework (SPF) authentication. Whether or not this was due to an initial misconfiguration of the third-party email server or the threat actor had the capability to compromise the email server configuration is unknown.<\/p>\n<p>At this point, the threat actor then confirmed to Partner B details that Partner A had shared, modifying the information to have the updated (and fraudulent) banking information from the first phase. However, Partner A and Partner B believed they were talking to the correct email recipients. This led to Partner B eventually depositing the funds into the threat actor\u2019s bank account.<\/p>\n<p>The scheme looks planned and deliberate, as can be seen in the timeline below:<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"10%\">\n<tbody readability=\"20\">\n<tr>\n<td height=\"22\" width=\"64\">Time<\/td>\n<td width=\"272\">Details<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td colspan=\"2\" height=\"25\" width=\"336\"><i>The email threads below were sent between Wednesday and Thursday.<\/i><\/td>\n<\/tr>\n<tr readability=\"3\">\n<td height=\"25\" width=\"64\">T+0:00<\/td>\n<td width=\"272\">Partner A sends an email reminder to Partner B, copying (CC) Partner C.<\/td>\n<\/tr>\n<tr readability=\"11.5\">\n<td height=\"79\" width=\"64\">T+4:30<\/td>\n<td width=\"272\" readability=\"10\">Threat Actor \u201creplies\u201d to the same email meant for Partner B, with updated bank information.<\/p>\n<p>This is not a reply though; it\u2019s a new email as evidenced by the <b>Message-ID<\/b> and relative email headers, sent through the compromised email server. While preserving the same display name, 1 out of the 6 email addresses was replaced with a threat actor-controlled one. <b>Reply-To<\/b> also was defined to be under the threat actor\u2019s control.<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td height=\"31\" width=\"64\">T+11:00<\/td>\n<td width=\"272\">Threat Actor \u201creplies\u201d again, but this time through the compromised email account of Partner C. The email has the same content as the previous reply.<\/td>\n<\/tr>\n<tr readability=\"7\">\n<td height=\"32\" width=\"64\">T+15:00<\/td>\n<td width=\"272\">Partner B confirms the invoice and informs \u201cPartner A\u201d (disguised threat actor) that they will review the submitted information, asking for business details. The actual replies go to the Threat Actor, and the email that Partner A (the real one) gets has 5 out of 6 original recipients replaced already.&nbsp;<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td colspan=\"2\" height=\"28\" width=\"336\">Friday, Saturday, and Sunday passes.<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td height=\"36\" width=\"64\">T+5.02 days<\/td>\n<td width=\"272\">Partner A replies with the correct business details to \u201cPartner B\u201d (disguised threat actor). This is the same email where 5 out of the 6 recipients are threat actor-controlled addresses.<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td height=\"28\" width=\"64\">T+5.17 days<\/td>\n<td width=\"272\">\u201cPartner A\u201d (disguised threat actor) sends a follow-up email to Partner B, confirming the business details required and the updated banking information that was formerly (the previous week) requested.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"34\" width=\"64\">T+5.64 days<\/td>\n<td width=\"272\">Partner B deposits the money to the Threat Actor&#8217;s bank account.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"38\" width=\"64\">T+5.66 days<\/td>\n<td width=\"272\">Partner B informs \u201cPartner A\u201d (disguised threat actor) that the deposit has been made.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>At the end of this timeline, Partner A prompted Partner B for the confirmation of the transfer about 12 days after the initial reminder of the invoice. By then, the funds have been fully transferred to the threat actor.<\/p>\n<p>It should also be noted that the recipients from both Partner A and Partner B were still sending emails to and from each other, in separate conversations from this email thread. For most email clients, auto-completed email addresses are populated if an end-user has replied to that email address once before. Thus, the threat actor selectively replaced the auto-completed email addresses with the real and intended recipients, so that the conversations would happen naturally.<\/p>\n<p>We\u2019ve counted about 5 other email threads, beyond the initial invoicing (where funds were transferred), and where the original sender from either Partner A or Partner B was sending emails to threat actor-controlled email addresses, but the \u201creal\u201d and intended email recipient would get the email later. But again, since Partner A, Partner B, and Partner C are expected email senders and recipients, all parties saw was that the email conversations were flowing.&nbsp;<\/p>\n<p><b>Can this be avoided? Not entirely, but it can be made difficult to accomplish.<\/b><\/p>\n<p>Before we address that question, let\u2019s look at this incident through&nbsp;<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK<\/a>&nbsp;techniques:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Having various means of email collection (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1114\/\" target=\"_blank\" rel=\"noopener\">T1114<\/a>) of their targets, the threat actor would have been informed of such an opportunity when such conversation is happening within the target organizations.<\/span>\n<ul>\n<li><span class=\"rte-circle-bullet\">While it was not directly confirmed in this incident, one very common way this could happen is to have valid domain accounts taken over (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1078\/002\/\" target=\"_blank\" rel=\"noopener\">T1078<\/a>), and then utilize some form of email forwarding rule (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1114\/003\/\" target=\"_blank\" rel=\"noopener\">T1114.003<\/a>).<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"rte-red-bullet\">To further facilitate email sending, the threat actor also compromised a third-party email server (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1584\/004\/\" target=\"_blank\" rel=\"noopener\">T1584.004<\/a>) that had little to no restrictions. The compromised email server was of a valid organization too, so everything about it seems legitimate, but it had very little control for outbound emails.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Email accounts are set up to mimic the email login \u2013 e.g., instead of having user1[@] partnerA.com, it would be user1[@] free-email-domain.com that would be used.&nbsp; These were previously established (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1585\/002\/\" target=\"_blank\" rel=\"noopener\">T1585.002<\/a>) based on the knowledge of the Threat Actor for each entity involved in this incident as they were able to create various email addresses for different individuals across Partner A, Partner B, and Partner C, setting the display name of such email addresses to mimic the real individual.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The threat actor utilizes the Trusted Relationship between all parties (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1199\/\" target=\"_blank\" rel=\"noopener\">T1199<\/a>) and is heavily reliant on this to be pre-existing throughout the entire B2B BEC incident.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The result is financial theft (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1657\/\" target=\"_blank\" rel=\"noopener\">T1657<\/a>) and, for the owner of the compromised email server, resource hijacking (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1496\/\" target=\"_blank\" rel=\"noopener\">T1496<\/a>).<\/span><\/li>\n<\/ul>\n<p>With multiple aspects to consider, a single organization can only implement controls within an environment that it has an influence on. However, for a single organization, it would be advantageous to look at ways to make it at least a bit more difficult for threat actors to launch successful B2B BECs.<\/p>\n<p>The recommendations below would mostly apply if your organization had been targeted in a similar fashion:<\/p>\n<p><b>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Check with your email security vendor about implementing additional email security controls, such as DMARC (Domain-based Message Authentication, Reporting &amp; Conformance), DKIM (DomainKeys Identified Mail), and SPF (Sender Policy Framework)<\/b><\/p>\n<p>In this incident, the emails that the threat actor had created had obvious signs of those emails failing these checks:<\/p>\n<p><span class=\"blockquote\">ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip<br \/>is 11.22.33.44) smtp.rcpttodomain=PartnerA.com smtp.mailfrom=PartnerB.com;<br \/>dmarc=fail (p=none sp=none pct=100) action=none header.from=PartnerB.com;<br \/>dkim=none (message not signed); arc=pass (0 oda=0 ltdi=0 93)<br \/>ARC-Authentication-Results: i=1; rspamd-587694846-cqc8b; auth=pass<br \/>smtp.auth=spamcontrol26 smtp.mailfrom=finance-person@PartnerB.com<br \/>Authentication-Results: spf=softfail (sender IP is xx.yy.aa.bb)<br \/>smtp.mailfrom=PartnerB.com; dkim=none (message not signed)<br \/>header.d=none;dmarc=fail action=none header.from=PartnerB.com;compauth=other<br \/>reason=501<br \/>Received-SPF: SoftFail (protection.outlook.com: domain of transitioning<br \/>PartnerB.com discourages use of xx.yy.aa.bb as permitted sender)<\/span><\/p>\n<p><i>(note: IP addresses and email domains are masked or removed)<\/i><\/p>\n<p>But because the DMARC policy for emails that fail validation was set to \u201caction=none\u201d, then such emails are simply granted passage and arrived at Partner A\u2019s mailbox. A strict DMARC policy would\u2019ve helped in this case, as these emails would not pass the verification or, at the very least, the email should have been tagged in the subject line with labels such as [SPAM] or [Suspicious] and delivered to the spam or junk folder.<\/p>\n<p>Setting this globally for all email domains should be discussed with business stakeholders, as it will affect the deliverability of emails sent from the domain names.&nbsp;However, in this case for B2B transactions, the two organizations may agree to implement such email controls for email conversations that involve monetary transactions.<\/p>\n<p><b>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Consider digitally signing the emails, especially between individuals who transact financially through email<\/b><\/p>\n<p>The emails that the threat actor had sent through the compromised email server had the following email headers:<\/p>\n<p><span class=\"blockquote\">Received: by webmail.emailsrvr.tld (Authenticated sender:<br \/>compromised-account@compromised.email.server, from: finance-person[@]PartnerB.com)&nbsp; with HTTP<br \/>Authentication-Results: spf=pass (sender IP is xx.yy.aa.bb)<br \/>smtp.mailfrom=compromised.email.server; dkim=none (message not signed)<br \/>header.d=none;dmarc=fail action=none header.from=PartnerB.com;compauth=fail<br \/>reason=001<br \/>Received-SPF: Pass (protection.outlook.com: domain of compromised.email.server designates<br \/>xx.yy.aa.bb as permitted sender) receiver=protection.outlook.com;<br \/>client-ip=xx.yy.aa.bb; helo=smtp116.sub.emailsrvr.tld; pr=C<br \/>X-Auth-ID: compromised-account@compromised.email.server<br \/>Reply-To: finance-person[@]free-email-domain.com<\/span><\/p>\n<p><i>(note: IP addresses and email domains are masked or removed<\/i>)<\/p>\n<p>It is evident in the headers above that the email passed SPF, even though the sender was not using their designated email address and had a different Reply-To.<\/p>\n<p>The DMARC settings mentioned above would have helped similarly. Another measure that could be considered would be the use of email digital signatures, enhancing an email conversation\u2019s confidentiality and integrity. This would validate the email sender\u2019s authenticity while ensuring that the email was not altered from its original form.<\/p>\n<p>Combined with best practices such as enabling <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/mfa\" target=\"_blank\" rel=\"noopener\">multi-factor authentication (MFA)<\/a> for network and auditing logins, emails stamped with digital signatures would make it difficult to craft messages claiming to be coming from someone when it was actually sent from another source.<\/p>\n<p>Again, setting this company-wide and globally for all email domains could be a good idea, but this should be discussed with business stakeholders. For B2B transactions, the partner organizations might enforce such email controls to ensure that emails are not tampered with and are coming from an email account that has the correct and valid digital signature.<\/p>\n<p><b>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Extended auditing for specific individuals, especially those who transact financially through emails<\/b><\/p>\n<p>The lucrative targets for B2B BEC, or even just BEC in the usual sense, are the high-profile members of the organization. Thus, extended monitoring and alerting might be warranted. Depending on the capability of your security tools, the following alerting use cases may be possible:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">MFA has been disabled<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Anomalous events in the logon platform (such as Impossible Travel)<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Monitor for suspicious activities such as unprompted&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1114\/003\/\" target=\"_blank\" rel=\"noopener\">creation of forwarding rules<\/a>, as this is one of the early indicators observed in BEC operations<\/span><\/li>\n<\/ul>\n<p>Organizations could check with their email service or security provider for BEC use cases, ATO monitoring, or similar activities such as identity protection, and ask them to prioritize this for the company.<\/p>\n<p><b>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Target specific education and processes for these high-profile users<\/b><\/p>\n<p>As one of the exploited factors in this situation is implicit trust between certain individuals within two or more organizations, those sets of high-profile users may be subject to another subset of education and training. Organizations could go through phishing training, and specific to high-profile users, conduct B2B BEC-type simulations. This will allow them to be more vigilant instead of just trusting a name that comes across their inbox, embedding a practice of scrutinizing emailed instructions that mention changes in accounts for sending money.<\/p>\n<p>In the incident discussed in this article, several email addresses between the different partner organizations included in the carbon copy (CC) on the email thread were replaced with other addresses based on a free email service. While it would understandably be difficult for the users to notice anything unusual, it still helps to pay attention to suspicious changes such as this, especially when the email requests a fund transfer.<\/p>\n<p><b>5.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Establish a validation protocol between your partners<\/b><\/p>\n<p>Analyzing the incident timeline, it would have been possible to verify the instructions if there was a way to confirm the sender\u2019s identity through other means on the first day, literally minutes after the threat actor sent the instructions. For example, if there had been an agreement between Partner B and Partner A to validate the email transaction through video\/phone calls, then the instructions could\u2019ve been double-checked on the spot. &nbsp;<\/p>\n<p>As outlined by MITRE\u2019s <a href=\"https:\/\/attack.mitre.org\/mitigations\/M1060\/\" target=\"_blank\" rel=\"noopener\">M1060<\/a> guidance, by implementing secure out-of-band communication channels, these alternative paths that are independent of the potentially compromised network might help ensure the continuity and security of critical communications, reducing the risk that adversaries may be able to intercept or tamper sensitive data in the event an attack takes place. Various forms of this exist today, like encrypted messaging apps, secure phone lines, etc.<\/p>\n<p>It could also be process control, whereby account changes, would require verifying the authenticity beforehand \u2013 e.g., before sending the email for instructions that affect financial transactions, it would require something more than just an email beforehand. Thus, if an email instruction arrives requiring the change of banking information, this raises an alert since technically they violate a pre-agreed process.<\/p>\n<p><b>6.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hunt through emails for violation of processes, amongst high-profile individuals<\/b><\/p>\n<p>Performed at least internally within the organization, the standard process should be enforced and monitored. Consider this example:<\/p>\n<p><span class=\"blockquote\">From:&nbsp;invoicing[@]partner_organizationA.com<br \/>To:&nbsp;accounts_payable[@]partner_organizationB.com<br \/>Subject: Invoice from &lt;Partner Organization&gt; &#8211; reference ticket number<br \/>Email characteristics:<br \/><\/span><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">SPF and DKIM configured <\/span><\/li>\n<li><span class=\"rte-red-bullet\">DMARC enforced, with Block Permanently<\/span><\/li>\n<\/ul>\n<p>If that is the pre-agreed standards, then alerting logic can be created if it falls outside those parameters. For Trend Vision One using the Trend Micro Email Sensor, alerting rules can be set with this logic:<\/p>\n<p><span class=\"blockquote\">(mailFromAddresses: invoicing[@]partner_organizationA.com OR<br \/>mailToAddresses: accounts_payable[@]partner_organizationB.com)&nbsp; AND<br \/>(mailMsgSubject:Invoice) AND (mailWantedHeaderValue:dmarc=fail OR<br \/>mailWantedHeaderValue:dkim=none) AND (mailDirection:3)<\/span><\/p>\n<p>This hunting rule can be expanded or changed depending on the requirements, but it would look for:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Any emails that are inbound,<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Coming from either invoicing[@]partner_organizationA.com or&nbsp; destined for accounts_payable[@]partner_organizationB.com,<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Has the pre-agreed email subject, and<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Characteristics of the email \u2013 such as SPF, DKIM, or DMARC \u2013 that violate the business rules between the two organizations.<\/span><\/li>\n<\/ul>\n<p>More hunting queries are available for Trend Vision One customers with&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform\/threat-insights.html\" title=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform\/threat-insights.html\">Threat Insights Entitlement enabled<\/a><\/p>\n<p><span class=\"body-subhead-title\">Conclusion<\/span><\/p>\n<p>If successful, a business email compromise (BEC) that has been carried out in the right time is costly for an organization. However, it is highly possible that the existing technology implemented by an organization may already have certain email protection features that can help limit the effectiveness of such attacks. Therefore, businesses are encouraged to be mindful of assessing the proper cybersecurity measures with their email service provider and their email security vendor, alongside being aware of the normal business practices &#8211; even among trusted business partners.<\/p>\n<p>For example, implementing proper DMARC settings can be an essential safeguard for minimizing the success of BEC. But it\u2019s important to note that while the technology is highly effective, it\u2019s only part of a broader security framework. Specifically, DMARC builds on SPF and DomainKeys Identified Mail (DKIM), which are also core best practices recommended by industry groups like <a href=\"https:\/\/www.m3aawg.org\/sites\/default\/files\/m3aawg-email-authentication-recommended-best-practices-09-2020.pdf\" target=\"_blank\" rel=\"noopener\">M3AAWG<\/a> and endorsed by <a href=\"https:\/\/workspace.google.com\/learn-more\/security\/security-whitepaper\/page-8.html\" target=\"_blank\" rel=\"noopener\">Google<\/a>. However, organizations looking to implement DMARC may face challenges due to its complexity. In such cases, it\u2019s crucial for organizations to collaborate with their email, messaging, and collaboration vendors to ensure proper configuration and integration.<\/p>\n<p>It might also help to use specifications such as&nbsp;<a href=\"https:\/\/bimigroup.org\/\" target=\"_blank\" rel=\"noopener\">BIMI<\/a>&nbsp;allow displaying an organization\u2019s brand logo on emails that pass DMARC validation. This helps recipients distinguish the emails that legitimately came from a trusted source from the messages from unauthenticated resources.<\/p>\n<p><span class=\"body-subhead-title\">Proactive security with Trend Vision One<\/span><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\" title=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">Trend Vision One<\/a>&nbsp;is an enterprise cybersecurity platform that simplifies security and helps enterprises detect and stop threats faster by consolidating multiple security capabilities, enabling greater command of the enterprise\u2019s attack surface, and providing complete visibility into its cyber risk posture. The cloud-based platform leverages AI and threat intelligence from 250 million sensors and 16 threat research centers around the globe to provide comprehensive risk insights, earlier threat detection, and automated risk and threat response options in a single solution.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Trend Vision One Threat Intelligence&nbsp;<\/span><\/p>\n<p>To stay ahead of emerging threats,&nbsp;Trend Vision One customers can access a range of Intelligence Reports and Threat Insights. Threat Insights helps customers stay ahead of cyber threats before they happen and allows them to prepare for emerging threats by offering comprehensive information on threat actors, their malicious activities, and their techniques. By leveraging this intelligence, customers can take proactive steps to protect their environments, mitigate risks, and effectively respond to threats.&nbsp;<\/p>\n<p><b>Trend Vision One Threat Insights App<\/b><\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/c\/from-event-to-insight.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro\u2122 Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":58247,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9509,9535],"class_list":["post-58246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-research","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/DMARC-thumbnail:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario\",\"datePublished\":\"2025-03-05T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/\"},\"wordCount\":2815,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Research\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/\",\"name\":\"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png\",\"datePublished\":\"2025-03-05T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png\",\"width\":976,\"height\":535},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/","og_locale":"en_US","og_type":"article","og_title":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-03-05T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/DMARC-thumbnail:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario","datePublished":"2025-03-05T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/"},"wordCount":2815,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Research","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/","url":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/","name":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png","datePublished":"2025-03-05T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/03\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario.png","width":976,"height":535},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/from-event-to-insight-unpacking-a-b2b-business-email-compromise-bec-scenario\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58246"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/58247"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}