". once the new account is online, they can elevate that account to have global admin permissions and truly have the keys to the kingdom, being able to change anything, add rules, and cover their tracks. these are just two out of countless types of bec attacks that we at huntress …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1098.002Additional Email Delegate Permissions
80%
"or undo any compromise that has taken place, as well as ensure the environment is fortified against future attacks. some examples of the attacks that we are already looking for and detecting within microsoft 365 tenants are : suspicious inbox rules this attack looks to take real …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
44%
"a fairly linear process for getting the end result — either financial gain for the threat actor or gaining personally identifiable information ( pii ) to be sold or used at a later date. the bec attack chain typically looks something like this : as you see in the above graphic, t…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1586.002Email Accounts
33%
"huntress managed itdr ( formerly mdr for microsoft 365 ) | huntress since our inception, huntress has had a guiding principle to protect the 99 %. this ethos has led us to create products, features, and functionality that look to prevent issues and stop problems that plague small…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Read up on how and why Huntress built its Managed ITDR (formerly MDR for Microsoft 365) solution to help combat the growing threat of business email compromise (BEC).