← All Playbooks
Business Email Compromise Playbook
Response guide for BEC and email fraud incidents
Free
5 Phases
1Phase 1: Detect
Confirm BEC Attack
Verify the business email compromise
- Review the suspicious email headers and content
- Check for signs of account compromise
- Verify if any fraudulent transactions occurred
- Identify affected email accounts
Assess Financial Impact
Determine if funds were transferred
- Contact finance/accounting immediately
- Review recent wire transfers and payments
- Check for pending fraudulent transactions
- Document all financial details
2Phase 2: Contain
Secure Affected Accounts
Prevent further unauthorized access
- Reset passwords for compromised accounts
- Enable MFA if not already enabled
- Review and revoke suspicious OAuth applications
- Check email forwarding rules for unauthorized entries
Stop Fraudulent Transactions
Attempt to recover funds
- Contact bank immediately to halt/recall transfers
- File report with FBI IC3 (ic3.gov)
- Work with receiving banks to freeze funds
- Document all recovery attempts
3Phase 3: Eradicate
Investigate Compromise Method
Determine how the account was compromised
- Review sign-in logs for suspicious activity
- Check for phishing emails that may have captured credentials
- Review password spray attempts
- Analyze any malware or malicious links clicked
4Phase 4: Recover
5Phase 5: Post-Incident
Prevention Measures
Implement controls to prevent future incidents
- Implement/strengthen email authentication (DMARC, DKIM, SPF)
- Train employees on BEC awareness
- Establish verbal verification for financial transactions
- Review and update email security policies