Business Email Compromise (BEC)

Mailbox Synchronisation and Malicious OAuth Applications

A typical Business Email Compromise (BEC) incident begins when a Threat Actor gains access to an email account, most commonly observed through successfully phishing their victim. Being financially motivated, not all attacks are successful. A critical part of a BEC investigation is determining if mailbox synchronisation has occurred, as this process creates a local offline copy of the mailbox.