Under attack? Call 1300 112 313
Guide · 6 min

Business email compromise response guide

A practical guide for investigating and containing suspected mailbox compromise.

Mailbox triage — the first 15 minutes

BEC incidents require immediate surgical intervention in the identity perimeter. The attacker's goal is typically financial — redirecting payments, extracting data, or establishing persistent access for future exploitation.

Check for unauthorised inbox rules first. Forwarding rules are the most common persistence mechanism — attackers create rules that forward emails containing "invoice", "payment", "wire", or "transfer" to an external address or the RSS Subscriptions folder where they are invisible to the user.

  • Check all inbox rules — forwarding, redirect, move, and delete rules
  • Check sent items and deleted items for emails the attacker sent
  • Review recent email activity for messages the user does not recognise
  • Check whether the attacker replied to any existing email threads

OAuth and application review

Attackers increasingly maintain persistence not by keeping the password, but by granting a malicious OAuth application permission to read the mailbox. This survives password resets. Review the compromised user's app consents and revoke any application you do not recognise.

In Microsoft 365, check Enterprise Applications and User Consent grants. In Google Workspace, check Third-party app access. Any application with Mail.Read, Mail.ReadWrite, or full mailbox access that was not explicitly approved by IT should be revoked immediately.

Session and credential reset

Reset the compromised user's password AND immediately revoke all active session tokens across all devices. A password reset alone is not sufficient — existing sessions remain valid until the tokens expire, which can be hours or days.

In Microsoft 365: reset password, then revoke sessions via Entra ID. In Google Workspace: reset password, then sign out all sessions. Also reset the password for any other accounts that share the same password (this is depressingly common).

Financial impact assessment

Determine whether the attacker successfully redirected any payments or issued fraudulent payment instructions. Check with the finance team for any recent requests to change bank details, urgent wire transfers, or gift card purchases. If a payment was redirected, contact the receiving bank immediately — recovery chances decrease dramatically after 24 hours.

Notification and communication

If the attacker accessed or exforted sensitive data, assess notification obligations under the Notifiable Data Breaches scheme. If payment fraud occurred, file a report with the Australian Cyber Security Centre (ACSC) and notify your cyber insurance provider.

Communicate clearly with affected staff — explain what happened, what was accessed, and what they need to do (e.g., be alert for phishing attempts using information from the compromised mailbox).

Need help applying this?

Turn the guide into an action plan.

Tenodex can assess your current state, prioritise the practical work and help implement the operating model.

Book a Briefing