Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
Exfiltration |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
Internal sender BCC'd an external recipient whose address has not been observed in prior communications.
Attacker's Goals
Use BCC to covertly exfiltrate data to an unusual external recipient without visibility to other recipients or monitoring systems.
Investigative actions
- Review headers and content for anomalies or potential exposure of sensitive data.
- Assess the email's context and attack techniques to determine the potential risk.
- Investigate if similar patterns have occurred recently across the organization.