February 24

Webinar takeaway – How to Detect and Respond to Business Email (M365) Compromise

0  comments

My key takeaways

  • BEC external-to-internal passes all technical security measures like SPF, DKIM and DMARC
  • BEC internal-to-internal bypasses anti-spam solutions
  • Get comfy with PowerShell to interact with M365
  • since Jan 2019 MS enabled mailbox auditing for Exchange Online
  • CrowdStrike Reporting Tool also reviews excessive permissions in Azure AD
  • If you are suspiscous to have a compromised account, start with a tenant wide investigation
  • less frequently used folders like Archive, Junk Mail and RSS Feeds are common for the attacker to store juicy mail in it for futher investigation
  • Many threat actors operate in +03 UTC, may be a good indicator
  • Mitigate by long passwords (15+ chars), MFA and disable auto forward to external domains

Env

  • Provided by BHIS

  • Speaker

    • Derek Banks
    • Troy Wojewoda
    • Hal Denton

additional links

Video

How to Detect and Respond to Business Email (M365)


Tags

blue team, fraud


You may also like

Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security

Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security

Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network

Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network
Leave a Reply

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit markiert.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}