Mitiga uncovered a widespread and well-executed Business Email Compromise (BEC) campaign in which cybercriminals are impersonating senior executives using Office 365’s email services in order to intercept sensitive communications and then alter wire transfer details and redirect funds to rogue bank accounts.

Our investigation revealed the following pattern

1. All of the threat actor’s rogue email accounts utilized Office 365 in order to reduce suspicious discrepancies and avoid malicious detection systems.

2. All of the rogue domains used in this campaign have been registered on Wild West Domains (a domain registrar owned by GoDaddy).

3. The rogue domains imitated those of legitimate businesses.

Based on this pattern, Mitiga has identified that over 150 organizations may have been impacted worldwide. To the best of our knowledge, this BEC campaign has successfully netted over $15M to date (and counting).

All pertinent details of our investigation have been provided to both law enforcement and Microsoft.

Background on Global BEC Campaign

Mitiga was called-in to investigate a large commercial transaction that was severely compromised. While we cannot divulge specific details about our client and the exact context in which the attack took place, we can state that it was part of a multi-million-dollar global transaction.

Our investigation determined that the threat actor’s attack extended over several months, included careful preparation, as well as monitoring and manipulation of email traffic before and during the transfer of funds.

When the transaction between the buyer and the seller reached the payment phase, the threat actor, who had previously intercepted the wire transfer details, impersonated the senior parties in the transaction, and provided the buyer with altered wire instructions.

Once the wire was executed and the funds did not reach the seller’s bank account, the incident began to unravel, and Mitiga was called-in to investigate.

Modus Operandi of Attackers

Image for post

Upon investigation, Mitiga’s Incident Response team identified rogue domains through which the threat actor’s emails were sent. These domains were similar to the buyer’s and seller’s own domains, but with minor changes which were difficult to notice. For example, if the original domain was ‘buyer.com,’ the rogue domain was ‘buyerr.com’.

All the malicious domains utilized in this BEC attack were registered through a GoDaddy-owned domain registrar called, ‘Wild West Domains’.

We believe that the threat actor chose to use Office 365 in order to improve the likelihood of a successful attack, thanks to the credibility it can generate. The threat actor’s use of the same technology stack reduced both suspicious discrepancies and the likelihood of triggering malicious detection filtering, which ultimately contributed to the rogue emails slipping through.

Another characteristic of this attack is that a ‘Forwarding Rule’ was created within email mailboxes of the impacted party. This rule automatically transmitted all emails to an external email account, presumably belonging to the threat actor.

This provided the threat actor with full visibility of the transaction and allowed for the introduction of the fake domain at just the right moment, i.e., when the wire transfer details were provided.

The threat actor then used filtering rules to discreetly move messages originating from certain email addresses from the inbox folder into a concealed folder. This was done to hide unwanted communication from the actual mailbox owner, for example, emails expressing concern from the legitimate parties — thereby extending the time to discovery of the attack in order to complete obfuscation of the wire transfer.

We know for certain that this BEC attack was not a singular event. Rather than use a brand-new Office 365 account for each target, the threat actors used the same Office 365 account. As a result, we identified over 150 additional domains, all of them registered on Wild West Domains, imitating other legitimate businesses, and connected to one of 15 different Office 365 accounts.

Our professional assessment, shared by the authorities we’re collaborating with, led us to determine that we have identified an extensive global BEC campaign, run by one or more cybercrime groups, that leverages the credibility of Office 365 to perform highly efficient Business Email Compromise attacks.

Mitiga Recommendations

In order to safeguard your organization and its email accounts from this BEC campaign, we recommend the following security measures:

  1. Enforce Office 365 password updates.
  2. Enforce Office 365 2-factor authentication.
  3. Examine forwarding rules in email accounts.
  4. Set rules to prevent bulk forwarding of emails outside of the organization.
  5. Search for hidden folders within inboxes.
  6. Block legacy email protocols, such as POP, IMAP, and SMTP1, that can be used to circumvent multi-factor authentication.
  7. Ensure changes to mailbox login and settings are logged and retained for 90 days.
  8. Enable alerts for suspicious activity, such as foreign logins, and analyze server logs for anomalous email access.
  9. Consider subscribing to a domain management service.
  10. Increase awareness and review controls for wire transactions (phone authentication in addition to email, as well as verify signatures and accounts).
What are the top 5 new security challenges in cloud environments?

LAST UPDATED:

April 7, 2025

Don't miss these stories:

Why Visibility Drives Everything in Modern Cybersecurity with Sevco’s Greg Fitzgerald

In this episode of Mitiga Mic, Brian Contos sits down with Greg Fitzgerald, co-founder of Sevco Security, for a candid conversation on the real state of asset visibility, prioritization, and the evolving challenges facing security teams. With nearly three decades in the industry, Fitzgerald brings perspective on how cybersecurity has shifted from endpoint tools to orchestration-wide awareness. And why that shift is critical for cloud, SaaS, AI, and identity defense. Watch the episode or read the full transcript below.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.

God-Mode in the Shadows: When Security Tools and Excessive Permissions Become Cloud Security Risks

By the time the alarms go off, it’s often too late. A trusted third-party security tool, one that promised to protect your cloud and SaaS environments, has been operating with unchecked ‘god-mode’ privileges. These tools, usually classified as SaaS Security Posture Management (SSPM) or Data Security Posture Management (DSPM), have been granted near-unrestricted access to your data, configurations, and secrets.

How AI Is Transforming Cybersecurity: Detection, Response & Threat Evolution with Mitiga’s Ofer Maor

In this episode of Mitiga Mic, Brian Contos, Field CISO at Mitiga, sits down once again with Ofer Maor, CTO and Co-founder, to break down one of today’s most urgent cybersecurity challenges: the intersection of Artificial Intelligence (AI) and Detection & Response. From the Automated SOC to AI-powered attackers and cloud-based AI infrastructure threats, Ofer outlines the three pillars of AI-DR (AI Detection and Response) and what organizations need to know now and in the near future.

Meet Mitiga in Las Vegas at Black Hat, DEF CON, and BSides

From August 4 to 11, Mitiga will be on the ground in Las Vegas for Black Hat USA, DEF CON, and BSides Las Vegas. If you’re responsible for cloud security, SaaS threat detection, or incident response, this is your opportunity to connect directly with our team.

Why Wi-Fi Isn’t Enough: Joseph Salazar on Wireless Airspace Security

In this episode of Mitiga Mic, we sit down with cybersecurity veteran Joseph Salazar, now with Bastille Networks, to uncover the vast and often invisible world of wireless attack surfaces. From Bluetooth-enabled coffee mugs and smart thermostats to malicious USB cables that launch attacks from parking lots, Joseph walks us through real-world threats that operate outside your firewall and beyond traditional security tools.