Sector
Legal firm handling sensitive commercial and litigation matters.
Using SOC365 and deception devices to detect and contain a business email compromise affecting a legal practice.
A mid-sized legal firm experienced signs of suspicious email activity, including anomalous rules, forwarders, and client complaints about unusual messages. The firm needed to understand whether accounts were compromised, prevent payment fraud, and reassure key clients.
Cyber Defence used SOC365, integration with Microsoft 365, and deception techniques to identify attacker behaviour and contain the incident.
Context
Legal firm handling sensitive commercial and litigation matters.
Microsoft 365, case management, document management, and remote working platforms.
Identify compromised accounts, prevent payment redirection, protect client confidentiality.
1. SOC365 connected to Microsoft 365 to ingest sign-in logs, audit logs, and mailbox activity.
2. Detection engineering focused on suspicious forwarding rules, inbox manipulation, and anomalous sign-in patterns.
3. Deception: planted decoy mailboxes and credentials designed to be attractive to attackers.
4. Threat intelligence correlation for known BEC infrastructure and phishing domains.
5. Guided remediation to remove malicious rules, enforce MFA, reset credentials, and notify affected clients where necessary.
Outcomes
A small number of accounts were confirmed as compromised; the rest were verified as unaffected.
No fraudulent payments were ultimately processed following remediation and client notifications.
New BEC-focused detections were implemented in SOC365 for this and other legal clients.
Interaction with decoy mailboxes provided clear evidence of attacker behaviour without impacting real users.
Clear communication and documented response supported client trust and regulatory comfort.
MFA adoption, conditional access policies, and session controls were improved.