Technical Aspects of BEC

Technical Aspects of BEC

While primarily social engineering, BEC often involves technical elements:

Email Spoofing Techniques:

  • Display name spoofing to show executive names
  • Domain spoofing using lookalike domains
  • Compromised email accounts for authenticity
  • Reply-to manipulation directing responses elsewhere
  • Unicode characters creating visual similarity

Account Takeover Methods:

  • Credential phishing targeting specific employees
  • Password spraying using common passwords
  • Exploiting password reuse from breached databases
  • Session hijacking through malware
  • Social engineering of password resets

Persistence Techniques:

  • Email forwarding rules hiding attacker access
  • Deleted items retention bypassing
  • Calendar access for intelligence gathering
  • Contact list harvesting for future attacks
  • Mobile device synchronization exploitation