Case Study: Multi-Actor Intrusion in Business Email Compromise
April 21, 2026 I 11:00 - 11:45 CET
Philipp Santos de Oliveira, Cybersecurity Consultant
What happens when not one, but two threat actors gain access to the same environment without triggering a single alert?
In this session, we take you inside a business email compromise (BEC) incident investigated by Eye Security. What started as a single phishing email quickly escalated into a multi-actor intrusion, with threat actors bypassing MFA, hijacking sessions, and using trusted identities to spread further inside the organisation.
This is a step-by-step reconstruction of how modern BEC attacks unfold in Microsoft 365, from initial access to internal phishing, data exposure, and persistence.
Along the way, we break down the techniques used, including adversary-in-the-middle phishing, and show why classic controls often fail.
April 21, 2026 I 11:00 - 11:45 CET
Philipp Santos de Oliveira, Cybersecurity Consultant
What happens when not one, but two threat actors gain access to the same environment without triggering a single alert?
In this session, we take you inside a business email compromise (BEC) incident investigated by Eye Security. What started as a single phishing email quickly escalated into a multi-actor intrusion, with threat actors bypassing MFA, hijacking sessions, and using trusted identities to spread further inside the organisation.
This is a step-by-step reconstruction of how modern BEC attacks unfold in Microsoft 365, from initial access to internal phishing, data exposure, and persistence.
Along the way, we break down the techniques used, including adversary-in-the-middle phishing, and show why classic controls often fail.
850+ European organisations place their trust in Eye Security.
Enterprise-grade, made for the mid-market.
This is tailored cybersecurity that meets the scale and complexity of mid-market organisations without the overhead of enterprise-only tools. Simple and to the point. AI-driven detection and expert-led response prevent downtime, protect revenue, and safeguard operations while helping you prepare for the unexpected.
Protect business continuity
- Best-of-breed EDR and ITDR
- 24/7 in-house SOC
- 24/7 incident response
Build future readiness
- Annual cyber reviews
- Attack surface deep dives
- Proactive vulnerability and threat hunting
Simplify cybersecurity
- All-in-one, all-you-need package
- Onboarding within hours
- Built for your scale and risk profile
Accelerate compliance
- Streamlined audits and regulatory alignment
- Competitive cyber insurance premiums
- Frictionless insurance qualification and renewals
Discover why companies choose us.
Protect yourself against digital threats with Europe's leading Open XDR solution. Try a demo to see how Eye Security compares to your existing solution.
- Protect your business 24/7
- Prevent ransomware & data breaches
- Respond to attacks within minutes
- Mitigate financial losses with cyber insurance, advised by brokers
Trusted by European companies: