Cyber Pulse Academy

Latest News
⚠ TA0043 , Resource Development

MITRE ATT&CK T1586.002 Email Accounts

Adversaries compromise legitimate email accounts to establish footholds for phishing campaigns, thread hijacking, and business email compromise attacks. This simulation demonstrates how an attacker intercepts and injects malicious replies into an active email conversation between trusted parties, bypassing traditional security awareness because the conversation already exists in the victim's inbox with a verified history of legitimate correspondence.

Phishing Thread Hijack BEC Spam Relay
✉ Invoice Discussion
⚠ HIJACKED
JD Jennifer Davis (CEO) 09:15 AM
RE: Q3 Invoice , Wire Transfer Update
Hi Sarah, please process the attached Q3 invoice through our usual banking partner. The total is $48,500. Let me know once confirmed and I'll sign off on the authorization form.
SK Sarah Kim (Finance) 09:32 AM
RE: Q3 Invoice , Wire Transfer Update
Got it, Jennifer. I'll process this today and send confirmation by EOD. Routing through First National as usual. Will attach the wire receipt once completed.
Jennifer Davis (CEO) 10:05 AM
RE: Q3 Invoice , Wire Transfer Update
Sarah, correction , please route to our NEW banking details below. Urgent timing on this one, the vendor needs payment today. ↻ reply-chain injected
🕵
THREAD HIJACKED , Malicious reply injected into active conversation
🔒

🛠 Simulation Legend

Green avatar: Legitimate sender (Finance team member)
Blue avatar: Legitimate sender (CEO) , but this one was compromised
Red avatar (skull): Attacker impersonating CEO from compromised account
Step 1 Credential theft via phishing or dark web purchase
Step 2 Inbox monitoring , identify active financial threads
Step 3 Reply injection , hijack conversation with urgency
Step 4 Victim processes fraudulent wire transfer
Step 5 Funds dispersed via mule network & crypto tumblers

Why Compromised Email Accounts Matter

Email account compromise is the backbone of modern cybercrime, fueling business email compromise (BEC), spear-phishing at scale, and thread hijacking attacks that cost organizations billions annually. Understanding this threat is essential for every security professional.

$2.8B
Total losses from BEC scams in 2024 alone, according to the FBI IC3 Annual Report, making it the costliest cybercrime category for the eleventh consecutive year.
73%
Of all cyber incidents in enterprise environments involved compromised email accounts as the initial access vector, underscoring email as the dominant attack surface.
21,400+
IC3 complaints specifically related to business email compromise in 2024, representing a persistent and growing threat that impacts organizations of every size and sector.
$17.1B
Cumulative BEC losses since 2015 as tracked by the FBI IC3, demonstrating the sustained profitability and evolution of email-based fraud campaigns.

The scale of email account compromise has reached unprecedented levels in 2024-2025, with BEC losses climbing to $2.8 billion and representing the single largest source of financial loss in cybercrime. The FBI IC3 received over 21,400 BEC complaints in 2024, while the overall percentage of incidents involving email account compromise reached 73% across all sectors. The cumulative damage since tracking began in 2015 has reached an staggering $17.1 billion, reflecting not only the volume of attacks but also the increasing sophistication of adversary tradecraft. Industry analysts project a further 15% increase in BEC-related losses in 2025, driven by the adoption of AI-generated phishing content that achieves near-native language quality and by the expansion of thread hijacking techniques that exploit existing trust relationships between correspondents.


Nation-state threat groups have increasingly integrated email account compromise into their operational playbooks, using stolen credentials to conduct espionage, supply chain attacks, and influence operations. The accessibility of compromised email accounts on dark web marketplaces means that even unsophisticated threat actors can purchase access to corporate mailboxes for as little as $5 to $150 per account, depending on the organization's perceived value and the account's privilege level. The democratization of email compromise tools, including phishing kits like Evilginx2 and Modlishka, has lowered the barrier to entry and expanded the pool of adversaries capable of executing sophisticated BEC campaigns at scale.

Known APT Groups Using T1586.002

APT28 (Fancy Bear) APT29 (Cozy Bear) Kimsuky LAPSUS$ Star Blizzard (SEABORGIUM) OilRig (APT34) Charming Kitten (APT35) FIN7 (Carbanak) TA416 (Mustang Panda) Dark Hydra Scattered Spider FIN11
APT28 (Fancy Bear)

Russian GRU-linked group that systematically compromises email accounts of government officials, military personnel, and journalists to conduct spear-phishing and credential harvesting campaigns at global scale.

Origin: Russia (GRU Unit 26165)
APT29 (Cozy Bear)

SVR-linked group known for compromising email accounts of diplomatic targets and think tanks, notably using stolen credentials to access Microsoft 365 tenants in the 2024 Midnight Blizzard campaign.

Origin: Russia (SVR)
Kimsuky

North Korean group specializing in email account compromise of academic researchers, policy analysts, and South Korean government officials to gather intelligence and conduct credential theft operations.

Origin: North Korea (Lazarus Group cluster)
LAPSUS$

Volatile extortion group that compromised email accounts of major technology companies including Microsoft, Okta, and NVIDIA through social engineering, SIM swapping, and insider recruitment techniques.

Origin: United Kingdom / Brazil
Star Blizzard (SEABORGIUM)

Russian FSB-linked group that persistently compromises email accounts of former intelligence personnel, military officials, and defense industry staff to steal sensitive documents and conduct influence operations.

Origin: Russia (FSB Center 18)
OilRig (APT34)

Iranian group that compromises email accounts of Middle Eastern energy sector targets and financial institutions using custom phishing toolkits like POISONBOURBON and PHISHSYNCHRONIZE.

Origin: Iran (IRGC)

Key Terms & Concepts

Understanding the terminology behind email account compromise is critical for recognizing attack patterns, implementing effective defenses, and communicating threats across security teams.

✉ Business Email Compromise (BEC)

A targeted email fraud scheme where adversaries impersonate executives, vendors, or trusted partners to manipulate victims into transferring funds or sharing sensitive data. BEC attacks rely on social engineering rather than malware, making them difficult to detect with traditional security tools. The FBI has identified BEC as the most financially damaging cybercrime type every year since 2013, with losses growing exponentially as adversaries refine their tactics through AI-generated content and real-time conversation monitoring.

💡 Like a con artist forging a letter from your boss, complete with their signature and letterhead, asking you to wire money to a "new vendor."

🔐 Thread Hijacking

A sophisticated BEC variant where the attacker compromises an email account and injects malicious content into an existing, legitimate email conversation thread. Because the reply appears within a trusted conversation chain with authentic history, the victim is far more likely to comply with requests for wire transfers or data sharing. Thread hijacking bypasses email security awareness training because the context is familiar and the sender appears verified through the existing conversation history and prior legitimate messages.

💡 Imagine someone slipping a forged page into the middle of a real, ongoing conversation between you and your colleague , you'd never notice the handwriting changed.

🕵 Adversary-in-the-Middle (AiTM)

An attack technique where the adversary positions themselves between the victim and a legitimate service, intercepting authentication credentials and session tokens in real time. Using reverse-proxy phishing kits like Evilginx2, the attacker captures both the username/password and the authenticated session cookie, enabling them to bypass MFA entirely because they possess a valid, active session rather than just credentials. This technique has become the primary method for compromising email accounts protected by traditional MFA.

💡 Like a thief who not only copies your house key but also steals the doorman's guest list , they walk right in with a verified reservation.

🌐 Email Forwarding Rules

Attackers who compromise an email account often create hidden inbox rules that silently forward copies of all incoming messages to an external address controlled by the attacker. These rules enable persistent monitoring of the victim's communications, allowing the adversary to identify high-value conversations, track ongoing business deals, and time their thread hijacking attacks for maximum impact. Forwarding rules are typically created using the email provider's own rule engine, making them appear as legitimate user behavior.

💡 Like secretly installing a mail redirect at the post office , every letter that arrives at your mailbox also gets copied and sent to a PO box the attacker controls.

🔒 Credential Stuffing

An automated attack that uses lists of usernames and passwords exposed in data breaches to attempt login against email services and other platforms. Because many users reuse passwords across multiple services, a credential from one breach can unlock email accounts on another platform. Adversaries leverage massive credential databases compiled from past breaches and test them at scale using distributed botnets with rotating IP addresses to evade rate limiting and detection. Credential stuffing accounts for a significant portion of initial email account compromises.

💡 Like trying a stolen key on every door in an apartment building , eventually one of them will fit, and you'll walk right in.

⚡ Impossible Travel Detection

A security mechanism that flags login events when the same account is used from two geographically distant locations within a timeframe that makes physical travel impossible. For example, a login from New York followed by a login from Moscow within 30 minutes would trigger an alert. This technique is one of the most effective methods for detecting compromised email accounts, as adversaries often access stolen accounts from different countries or use VPN services that create geographical inconsistencies in login patterns.

💡 Like noticing your debit card was used at a coffee shop in London and then 20 minutes later at an ATM in Tokyo , clearly impossible, and clearly fraud.

Real-World Scenario: The Invoice Redirect

This scenario is based on composite patterns from actual BEC investigations reported to the FBI IC3 and documented in CISA advisories. All names and specific figures are illustrative but representative of real-world attack patterns observed across multiple industries.

RH

Rachel Hernandez , CFO, Meridian Global Logistics

Mid-size logistics firm with $340M annual revenue, 2,100 employees across 14 countries. Rachel manages all wire transfers above $10,000 and has authority to approve vendor payments up to $500,000.

🔴 What Happened , The Attack

On a Tuesday morning, Rachel received what appeared to be a routine reply in an ongoing email thread with their Singapore-based shipping partner, Pacific Freight Solutions. The email requested a routine change to banking details for an upcoming $287,000 payment. Because the message appeared within the existing conversation chain with full history, Rachel had no reason to suspect foul play. She approved the wire transfer to the new account, and the funds were dispersed within hours through a network of shell companies and cryptocurrency exchanges spanning three continents. The attacker had compromised the Pacific Freight Solutions CFO's email account two weeks earlier through an AiTM phishing attack, created hidden forwarding rules to monitor all incoming correspondence, and waited patiently for a high-value payment discussion to appear before injecting their malicious reply. By the time Meridian discovered the fraud, the money was unrecoverable.

🟢 What Should Have Happened , The Defense

If Meridian had implemented out-of-band verification for banking detail changes, Rachel would have called the Pacific Freight CFO directly using a known phone number to confirm the new account details before initiating any wire transfer. DMARC enforcement would have detected the spoofed reply origin. Behavioral analytics monitoring Rachel's email patterns would have flagged the anomalous request for a banking change embedded mid-conversation. MFA enforcement on the Pacific Freight email account would have prevented the initial compromise, and regular inbox rule audits would have detected the hidden forwarding rules created by the attacker. A combination of these controls would have broken the attack chain at multiple points, making the compromise exponentially more difficult to execute successfully.

📄 Attack Timeline Breakdown

🔑
Day -14

AiTM phishing email sent to Pacific Freight CFO

🔒
Day -14

Session token captured, MFA bypassed

📨
Day -13

Hidden forwarding rules created for all inbound mail

🔎
Day -5 to -1

Monitor inbox for high-value payment discussions

🕵
Day 0

Thread hijack reply injected with urgency language

💰
Day 0 + 4h

$287K transferred, dispersed via mule network

Step-by-Step Protection Guide

Implementing these seven defensive measures creates a layered defense-in-depth strategy that addresses email account compromise at every stage of the attack lifecycle, from initial credential theft through to post-compromise detection and response.

1

Deploy DMARC, DKIM, and SPF Email Authentication

Implement and enforce DMARC (Domain-based Message Authentication, Reporting, and Conformance) at policy level "p=reject" to prevent domain spoofing. Configure DKIM (DomainKeys Identified Mail) to cryptographically sign outgoing emails and allow receiving servers to verify message integrity. Deploy SPF (Sender Policy Framework) records to authorize which mail servers can send on behalf of your domain. These three protocols work together to prevent adversaries from sending emails that appear to come from your organization.

  • Set DMARC policy to "reject" , never "none" , and enable rua/ruf reporting for visibility into authentication failures across your domain ecosystem.
  • Monitor DMARC aggregate reports weekly to identify unauthorized senders attempting to spoof your domain and catch misconfigured internal services that may fail authentication checks.
  • Ensure all third-party services sending email on your behalf (marketing platforms, HR systems, support tools) are included in your SPF records and properly configured for DKIM signing.
PREVENT DETECT
2

Enforce Phishing-Resistant MFA on All Email Accounts

Deploy FIDO2/WebAuthn hardware security keys (YubiKey, Titan) as the primary authentication factor for all email accounts, particularly for executives, finance staff, and IT administrators. Phishing-resistant MFA methods cannot be intercepted or replayed by adversary-in-the-middle proxy attacks, making them the only effective defense against AiTM credential theft techniques. If hardware keys are not feasible for all users, enforce number matching MFA with authenticator apps as a minimum requirement, and disable SMS-based OTP entirely due to known SIM swapping vulnerabilities that completely negate its protective value.

  • Require FIDO2 keys for all accounts with wire transfer authority, administrative access, or access to sensitive data repositories , these are the highest-value targets for adversaries.
  • Implement conditional access policies that require MFA from unfamiliar locations, new devices, or IP addresses outside your corporate network range to add additional context-based verification.
PREVENT RESPOND
3

Deploy Advanced Email Gateway with AI Detection

Implement a next-generation secure email gateway (SEG) with machine learning-based anomaly detection capable of identifying BEC patterns including urgency language, unusual sender behavior deviations, and subtle domain impersonation techniques like typosquatting and homoglyph attacks. The SEG should integrate directly with your email platform's API to inspect internal-to-internal email traffic, not just inbound messages from external senders, because thread hijacking attacks originate from compromised internal accounts that traditional boundary-based defenses cannot detect without internal traffic inspection.

  • Enable internal email scanning for BEC indicators , many organizations only scan inbound messages, leaving compromised internal accounts free to send thread hijack replies without detection.
  • Configure image-based OCR analysis to detect invoice fraud and banking detail manipulation within PDF attachments and embedded images that traditional content filters may miss entirely.
  • Implement sender behavior baseline modeling that flags anomalies such as unusual sending times, new recipients, language style deviations, and sudden changes in communication frequency or volume patterns.
DETECT PREVENT
4

Mandate Out-of-Band Verification for Financial Transactions

Establish and enforce a strict policy requiring verbal confirmation through a known, pre-established phone number (not a number provided in the email) for all wire transfers, banking detail changes, ACH modifications, and vendor payment setup requests exceeding a defined threshold. This single control is the most effective measure against BEC because it breaks the attacker's primary communication channel and forces verification through a channel the adversary does not control. Train finance staff to recognize social engineering pressure tactics including artificial urgency, executive impersonation, and confidentiality requests designed to prevent the victim from seeking confirmation through normal channels.

  • Maintain a verified contact database with phone numbers confirmed through independent channels , never use contact information provided in a payment-change request email, as these may redirect to attacker-controlled numbers.
  • Create a simple verification checklist that finance staff must complete before any wire transfer above $10,000, including callback verification, new vendor due diligence, and supervisor approval for first-time payments.
PREVENT RESPOND
5

Monitor and Audit Inbox Rules Regularly

Implement automated monitoring to detect when email forwarding rules, delegation rules, or auto-responder rules are created or modified on any email account in the organization. Attackers who compromise email accounts almost always create hidden forwarding rules as their first post-compromise action to maintain persistent visibility into victim communications and identify future attack opportunities. Use Microsoft Exchange PowerShell cmdlets or Google Workspace Admin SDK to regularly enumerate all inbox rules across the organization and alert on any rules that forward mail to external domains, delete messages, or move messages to hidden folders that could indicate data concealment or evidence removal activities.

  • Deploy automated alerting for any forwarding rule that sends mail to external domains , this is the single most reliable indicator of a compromised email account and should trigger immediate investigation.
  • Audit inbox rules on a weekly basis using scripted enumeration and compare against a known-good baseline to detect unauthorized modifications that may have been created during an active compromise.
DETECT RESPOND
6

Implement Impossible Travel and Behavioral Analytics

Deploy identity threat detection and response (ITDR) solutions that monitor login patterns, geographic anomalies, device fingerprints, and behavioral baselines for every email account. Impossible travel detection should flag concurrent or rapid-succession logins from geographically distant locations, while behavioral analytics should detect deviations from established patterns such as unusual email volume, new recipients outside the user's normal communication circle, atypical attachment sizes or types, and abnormal access times. These signals provide early warning of account compromise before thread hijacking or BEC attacks can be executed, enabling rapid response to contain the threat and prevent financial losses.

  • Correlate email login events with VPN connection data and physical access logs to build a comprehensive authentication timeline that reveals impossible travel patterns and concurrent session anomalies.
  • Establish risk-score thresholds that automatically trigger conditional access policies , for example, requiring step-up authentication when a user's risk score exceeds a defined threshold due to anomalous behavior patterns.
DETECT
7

Conduct Regular Security Awareness Training with Simulations

Deliver monthly phishing simulation campaigns using realistic BEC scenarios including thread hijacking, executive impersonation, vendor invoice fraud, and urgency-based social engineering. Tailor simulations to each department's specific risk profile , finance teams should receive invoice-focused scenarios, HR should receive payroll diversion simulations, and executives should receive board-level impersonation exercises. Track click rates, credential submission rates, and reporting rates to measure program effectiveness, and provide immediate just-in-time training to users who fail simulations. Security awareness training must evolve beyond basic phishing recognition to include specific instruction on identifying thread hijacking indicators such as subtle changes in writing style, unexpected banking detail changes within existing conversations, and requests for unusual urgency or confidentiality from known contacts.

  • Include thread hijacking scenarios in your simulation program , most organizations only test basic phishing, leaving employees unprepared for the more sophisticated and financially devastating conversation hijack technique.
  • Track and report simulation metrics to leadership quarterly, including department-specific pass rates and trending improvement data, to maintain organizational commitment to the awareness training program budget and resources.
PREVENT DETECT

Common Mistakes & Best Practices

Understanding the most prevalent mistakes organizations make with email security, alongside proven best practices, provides a practical framework for strengthening your defenses against account compromise and BEC attacks.

❌ Common Mistakes

1

Relying solely on SMS-based MFA for email account protection. SMS OTP codes are vulnerable to SIM swapping, SS7 protocol exploitation, and real-time phishing proxy interception, providing a false sense of security while leaving accounts fully exposed to determined adversaries.

2

Setting DMARC to "none" or failing to implement DMARC at all. Without enforcement, adversaries can continue spoofing your domain with impunity, and your organization receives no visibility into who is attempting to impersonate your brand through email-based fraud campaigns.

3

Only scanning inbound email traffic while ignoring internal-to-internal communications. Thread hijacking attacks originate from compromised internal accounts, making boundary-based email security completely blind to the most damaging BEC variant in active use today.

4

Granting excessive email delegation and forwarding privileges without regular audits. Attackers create hidden forwarding rules as their first post-compromise action, and these rules often persist for months without detection because organizations never review or enumerate existing inbox rules.

5

Training employees only once per year on phishing awareness. Attack techniques evolve continuously, and quarterly training with realistic BEC and thread hijacking simulations is the minimum frequency required to maintain meaningful behavioral resistance to modern social engineering.

✔ Best Practices

1

Deploy FIDO2 hardware security keys for all privileged email accounts. Hardware tokens provide true phishing-resistant authentication that cannot be intercepted by AiTM proxy attacks, eliminating the most common initial access vector for email account compromise operations.

2

Enforce DMARC at "p=reject" with DKIM and SPF. This three-layer authentication framework prevents domain spoofing, enables cryptographic message verification, and provides comprehensive reporting on authentication failures across your entire email ecosystem for ongoing threat visibility.

3

Require out-of-band verification for all financial transactions using pre-established phone numbers. This single control breaks the attacker's primary communication channel and is the most cost-effective defense against BEC-related financial losses.

4

Automate inbox rule auditing and alerting to detect forwarding rules, delegation changes, and auto-responder modifications in real-time. Early detection of unauthorized rule creation is the most reliable indicator of email account compromise available to defenders.

5

Implement zero-trust email security that inspects all email traffic regardless of origin, applies behavioral analytics to detect anomalous sending patterns, and correlates email activity with broader identity signals for comprehensive threat detection.

Red Team vs Blue Team View

Understanding how attackers approach email account compromise (red team) and how defenders detect and respond to these attacks (blue team) provides comprehensive tactical insight into this critical threat domain.

🔴 Red Team , Attacker Perspective

T1586.002 , Email Accounts (Offensive)
  • Initial Access: Deploy Evilginx2 reverse proxy against Microsoft 365 login page to capture credentials and session cookies simultaneously, bypassing all MFA implementations including push-based authentication methods.
  • Reconnaissance: Create hidden inbox forwarding rules to monitor all incoming correspondence for 7-14 days, building intelligence on payment schedules, vendor relationships, executive travel, and active business deals before selecting targets.
  • Weaponization: Draft thread hijack replies that mirror the compromised user's writing style, tone, and vocabulary, using urgency language ("urgent," "ASAP," "time-sensitive") and confidentiality requests to suppress verification.
  • Execution: Inject the malicious reply into the most promising active conversation thread during business hours when the target is likely to be processing emails quickly without careful scrutiny of embedded payment instructions.
  • Exfiltration: Route stolen funds through a layered network of money mule accounts, cryptocurrency exchanges, and shell companies across multiple jurisdictions to complicate tracing and recovery efforts.

🔵 Blue Team , Defender Perspective

T1586.002 , Email Accounts (Defensive)
  • Prevention: Deploy FIDO2 hardware keys for all email accounts with financial authority, enforce conditional access policies that require step-up authentication from unfamiliar locations or devices, and implement DMARC at reject policy.
  • Detection: Monitor for impossible travel anomalies in login events, alert on creation of inbox forwarding rules to external domains, and use behavioral analytics to detect deviations from established email communication patterns and recipient lists.
  • Internal Monitoring: Enable advanced threat protection for internal email traffic scanning , thread hijacking attacks originate from compromised internal accounts and cannot be detected by traditional inbound-only email security gateways.
  • Incident Response: Maintain documented playbooks for email account compromise including immediate credential reset, session revocation, inbox rule audit, forwarding rule removal, and forensic review of all emails sent from the compromised account during the exposure window.
  • Continuous Improvement: Conduct quarterly phishing simulations including thread hijacking scenarios, track department-specific failure rates, and provide targeted just-in-time training to users who fall for realistic BEC simulations to maintain resistance levels.

Threat Hunter's Eye

Proactive threat hunting for email account compromise focuses on behavioral anomalies that indicate stolen credentials, hidden forwarding rules, and thread hijacking activity that automated tools may not detect until financial damage has already occurred.

🔍

Anomalous Sending Patterns

Monitor for sudden changes in email sending volume, recipient diversity, or timing patterns that deviate significantly from the user's established baseline. A compromised account often exhibits increased outbound email activity as the attacker conducts reconnaissance, sends phishing to internal targets, or exfiltrates data by emailing it to external addresses. Pay particular attention to accounts that suddenly email recipients outside their normal communication circle, especially external domains that have never appeared in the user's historical correspondence. Cross-reference sending anomalies with login events from unusual geographic locations or unfamiliar user agents to increase detection confidence.

index="o365" sourcetype="o365:management:activity" Operation="Send" | stats count by SenderAddress, RecipientAddress | where count > user_baseline * 2
🕵

Thread Hijacking Indicators

Hunt for emails that reply to existing conversation threads but contain banking detail changes, payment redirection requests, or urgency language that is atypical for the supposed sender. Look for replies where the message body contains keywords like "new banking," "updated account," "wire instructions," or "change of details" combined with the same subject line as an existing thread. Analyze the writing style of these replies for deviations from the sender's established vocabulary, sentence structure, and greeting patterns using linguistic analysis tools. Track whether the IP address or user agent of the reply differs from the original messages in the thread, which would strongly indicate a different person sent the hijacked reply.

index="email" "Subject: RE:*" body="banking" OR body="wire" OR body="payment details" | anomaly detection on sender behavior deviation
🌎

Impossible Travel Logins

Search for authentication events where the same email account authenticates from two geographically distant IP addresses within a timeframe that makes physical travel impossible. This is one of the strongest indicators of credential compromise, as legitimate users cannot travel between continents in minutes. Pay particular attention to logins from VPN exit nodes, Tor endpoints, or residential proxy services that adversaries use to mask their true location. Correlate impossible travel events with subsequent email activity to determine if the compromised account was used for data access, lateral movement, or BEC attacks after the anomalous login, and prioritize investigation of any account showing both impossible travel and subsequent email activity to new external recipients.

index="auth" sourcetype="azuread" | streamstats timewindow=2h global=f max(distance_km) as max_travel by user | where max_travel > 1000
1
Hidden Forwarding Rule to External Domain

Creation of inbox rules that forward copies of all incoming or specific emails to addresses outside the organization's approved domain list. This is the attacker's first persistent surveillance mechanism after compromise.

2
Concurrent Sessions from Distant Locations

Active authentication sessions from IP addresses in different countries or continents within minutes of each other, indicating credential sharing between the legitimate user and the adversary who stole their session.

3
Banking Detail Change Within Existing Thread

Reply within an active business conversation thread that introduces new payment routing information, account numbers, or banking instructions that differ from previously established and verified payment details.

4
Unusual Attachment Types from Executive Account

Executives or finance staff sending unexpected attachment types (especially .exe, .iso, .img, .zip with password) to internal recipients, suggesting the compromised account is being used for internal phishing or malware delivery.

📈 Email Compromise Risk Assessment

AiTM Phishing Risk
92%
BEC Financial Impact
88%
Thread Hijack Success
78%
Detection Difficulty
82%
MFA Bypass Feasibility
95%
FIDO2 Protection Level
15%

Risk percentages represent estimated effectiveness against enterprise environments without the specified control. FIDO2 protection at 15% risk means FIDO2 reduces AiTM phishing success to approximately 15% of unprotected baseline. Data derived from industry breach reports, CISA advisories, and MITRE ATT&CK technique analysis.

Strengthen Your Email Defenses Today

Email account compromise is not a theoretical threat , it is the most financially damaging cybercrime vector in the world. Take action now to protect your organization.

🛡 Defend Against T1586.002

The combination of phishing-resistant MFA, DMARC enforcement, internal email scanning, and out-of-band verification creates a layered defense that addresses email account compromise at every stage. Start by auditing your current email security posture, then implement the seven-step protection guide outlined above. Every day without these controls is a day your organization remains vulnerable to potentially catastrophic financial losses.

Related MITRE ATT&CK Techniques

Email Accounts


DONATE · SUPPORT

We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution - no matter the size - makes this platform sustainable.
100% of your support goes to the platform. No corporate sponsors, just the community.
ROOT::DONATE

Leave a Comment

Your email address will not be published. Required fields are marked *



Ask ChatGPT
Set ChatGPT API key
Find your Secret API key in your ChatGPT User settings and paste it here to connect ChatGPT with your Courses LMS website.
Certification Courses
Hands-On Labs
Threat Intelligence
Latest Cyber News
MITRE ATT&CK Breakdown
All Cyber Keywords

Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.

Choose the amount of donation by yourself.