Business Email Compromise (BEC) remains one of the most financially devastating forms of cybercrime, with the FBI reporting over $55 billion in BEC losses worldwide over the past 10 years. Requiring little technical expertise, BECs are relatively simple to execute and attackers have found clever ways to bypass most defenses, contributing to the high rate of incidents. Though attackers leverage various intrusion vectors to compromise email accounts, most BEC incidents are worsened by poor email and cloud security configurations, making it easier for attackers to move laterally, exfiltrate data, and increase the overall impact of the attack.
Most email solutions are no longer simple or much less standalone applications. Cloud systems that connect email, storage, file sharing, and identity management under a single authentication protocol have exponentially increased the attack surface for threat actors. Securely configuring cloud systems remains a challenge for organizations of all sizes.
Recognizing this critical need, Cybereason introduces the Security Configuration Snapshot, an innovative enhancement to traditional BEC investigations. The snapshot merges guidance from CISA’s Secure Cloud Business Applications (SCuBA) Project with threat intelligence gathered from thousands of real-world BEC incidents into an automated evaluation of email and cloud security configurations most commonly used by attackers. It identifies weaknesses allowing most common BEC attack patterns, providing immediate configuration recommendations post-engagement.
BEC Response Has Evolved
The Security Configuration Snapshot seamlessly integrates with BEC investigation flow to help minimize impact of incidents:
How The Security Configuration Snapshot Works
The Snapshot relies on the same admin access granted in the beginning of the BEC incident response, requiring no further resources from IT or Infosec to run. Once started, the Snapshot runs over 250 individual checks on M365 and Google Workspace, reviewing:
Security Configuration Snapshot for M365:
Security Configuration Snapshot for Google Workspace:
Key Security Controls Evaluated
The Snapshot checks configuration elements related to key controls such as:
The Security Configuration Snapshot can:
Seamless Integration Within BEC Investigations
The Security Configuration Snapshot is delivered as part of the standard BEC response timeline, with no additional client effort required or delays to the investigation. It ensures that security gaps are identified while resources are already committed to the investigation, rather than waiting until a time in the future when resources become available. Additionally, insights generated by the Snapshot can be protected under legal privilege when investigations are conducted in collaboration with legal counsel.
Why The Security Configuration Snapshot Matters
A Game-Changer for BEC Incident Response
The Security Configuration Snapshot represents a transformative step forward, helping minimize the impact of BEC incidents at no additional cost.
By seamlessly integrating into existing BEC investigations, this innovative tool helps organizations minimize lateral movement, establish a robust security baseline, and align their defenses with MITRE ATT&CK techniques. With BEC threats showing no signs of slowing down, the time to enhance incident response is now.
For more information on how Cybereason can enhance your BEC response and improve your overall cyber resilience, contact our experts 24x7 at response@cybereason.com.