A case study analysis
As highlighted in the Case Study chapter, High Tech Rapid Solutions faced a BEC attack six months ago. One of the main reasons it was successful from an attacker point of view was security infrastructure consisting of disparate products that operate in isolation, resulting in limited visibility, fragmented threat intelligence, and inefficient incident response capabilities.
By implementing Microsoft’s unified XDR and SIEM solutions, the company could address this security challenge. By utilizing Defender XDR and its security solutions, they would receive additional protection against a potential BEC attack in the future.
As with many known cyberattacks, a BEC attack usually starts with some form of phishing (reconnaissance first to get insights from a company), and the adversary tries to gain access (credentials) to the environment, as shown in Figure 5.20.
Figure 5.20 – A phishing email attack chain
For protection...