When compromised mailboxes attack & Using Microsoft Sentinel to Respond
Business Email Compromise (BEC) isn't fun for the owner of the compromised mailboxes, or the folks on the receiving end of phish sent from those compromised mailboxes. This post is for those in the latter camp, a place I've been on a couple of occasions in my career. In one instance the bad actor got rather ambitious and sent numerous phishing messages to my organization - all were leveraging existing threads in multiple mailboxes, and using at least one of three malicious hyperlinks. Here is how I attacked the problem with Sentinel: We blocked inbound mail from the source to stop the bleeding, and then went about identifying the messages involved: let suspectmessages = ( EmailEvents | where SenderFromDomain contains "sourceofphish.net" ) | summarize by NetworkMessageId; EmailUrlInfo | where NetworkMessageId has_any (suspectmessages) | summarize by Url Of course this could also be done in MS 365 Advanced Hunting, but I was SO HAPPY when email data was add...