the anatomy of a BEC attack
WEBINAR BRIEFING

Case Study: Multi-Actor Intrusion in Business Email Compromise

April 21, 2026 I 11:00 - 11:45 CET

Philipp Santos de Oliveira, Cybersecurity Consultant

What happens when not one, but two threat actors gain access to the same environment without triggering a single alert?

In this session, we take you inside a business email compromise (BEC) incident investigated by Eye Security. What started as a single phishing email quickly escalated into a multi-actor intrusion, with threat actors bypassing MFA, hijacking sessions, and using trusted identities to spread further inside the organisation.

This is a step-by-step reconstruction of how modern BEC attacks unfold in Microsoft 365, from initial access to internal phishing, data exposure, and persistence.

Along the way, we break down the techniques used, including adversary-in-the-middle phishing, and show why classic controls often fail.

the anatomy of a BEC attack
WEBINAR BRIEFING
Case Study: Multi-Actor Intrusion in Business Email Compromise

April 21, 2026 I 11:00 - 11:45 CET

Philipp Santos de Oliveira, Cybersecurity Consultant

What happens when not one, but two threat actors gain access to the same environment without triggering a single alert?

In this session, we take you inside a business email compromise (BEC) incident investigated by Eye Security. What started as a single phishing email quickly escalated into a multi-actor intrusion, with threat actors bypassing MFA, hijacking sessions, and using trusted identities to spread further inside the organisation.

This is a step-by-step reconstruction of how modern BEC attacks unfold in Microsoft 365, from initial access to internal phishing, data exposure, and persistence.

Along the way, we break down the techniques used, including adversary-in-the-middle phishing, and show why classic controls often fail.

850+ European organisations place their trust in Eye Security.

A pen test alone to identify all the threats would have cost us as much as our annual cost for Eye’s all round service.
Thorsten Spieker, Director of Engineering.
It feels great to know that someone is looking over your shoulder 24/7. Now I can sleep with two eyes closed.
Marco ter Haar, IT Manager.
It is very pleasant to work with a supplier who speaks our business’ language and also works together with our IT supplier
Gertjan Van der Most, CEO.
The pricing of the service is very transparent and fair.
Fred Westdijk, CEO.
I can really talk to them and they think constructively. They don’t just come in with some commercial product.
Peter Onland, Former IT Manager.

Enterprise-grade, made for the mid-market

This is tailored cybersecurity that meets the scale and complexity of mid-market organisations without the overhead of enterprise-only tools. Simple and to the point. AI-driven detection and expert-led response prevent downtime, protect revenue, and safeguard operations while helping you prepare for the unexpected. 

Get in touch

Discover why companies choose us.

Protect yourself against digital threats with Europe's leading Open XDR solution. Try a demo to see how Eye Security compares to your existing solution.

  • Protect your business 24/7
  • Prevent ransomware & data breaches
  • Respond to attacks within minutes
  • Mitigate financial losses with cyber insurance, advised by brokers

 

Trusted by European companies:

Talk to an expert.