Reduce the impact of business email compromise

If you are the target of a business email compromise attack, leverage our latest advanced analytics solutions to respond quickly and with confidence

Get in touch

A fast rising form of cyber crime

With more than half of all global businesses already using Office 365, business email compromise is a lucrative target for criminal groups with a seemingly never ending list of potential victims. Typical methods of compromise include phishing emails, the use of account credentials leaked in data breaches, social engineering, and brute force attacks. Once threat actors have control of accounts, they can send malicious and spam emails, facilitate fraudulent transactions, carry out reconnaissance on the business, and collect personal data that can be used for identity theft or fraud.

How we can help

When a business email compromise incident occurs, it is essential to establish the facts of the case, understand the behaviour of the threat actor, and address any security issues that are identified

We conduct a rapid initial assessment of the targeted environment to identify what data is available to support our investigation and any immediate security issues that need to be resolved

Our proprietary methodology is used to quantify risk across all user accounts, based on a wide range of data sources preserved from the environment

We conduct a fast and efficient investigation into individual user accounts, to reconstruct and evaluate the behaviour of the threat actor

We conduct a rapid initial assessment of the targeted environment to identify what data is available to support our investigation and any immediate security issues that need to be resolved

Our proprietary methodology is used to quantify risk across all user accounts, based on a wide range of data sources preserved from the affected environment

We conduct a fast and efficient investigation into individual user accounts, to reconstruct and evaluate the behaviour of the threat actor

Why Asceris?

  • With expertise in incident response, log analysis, data analytics and automation, our team bring practical experience of investigating account takeover incidents, particularly on the Microsoft 365 platform.
  • Our business email compromise service is underpinned by a custom-built solution that automates repeatable parts of the process to reduce errors and inefficiency.
  • We use a number of external data sources to identify safe and suspicious behaviour more accurately, including our list of over half a million known malicious IP addresses.
  • Our reports have been designed from the ground up with both insurers and their customers in mind.