Incident story · Business email compromise
Six weeks in the AP clerk's mailbox. One swapped invoice. $185K, gone overnight.
The owner of a $40M regional metal-fabrication shop in the Southeast got the call on a Thursday morning. His longtime steel supplier was on the line — politely asking when payment was coming for last month's order. His AP clerk had wired the money nine days earlier. The supplier had never received it. By the end of the day they knew an attacker had been quietly reading his AP clerk's email for six weeks, learning the routine, and waiting for the right invoice to swap. By the end of the week they knew the cyber insurance carrier was not going to pay — the policy required MFA, and the owner's application had said yes without ever actually enforcing it.
At a glance
The shape of the incident
What happened
Six weeks of silence, then one Thursday morning
Week one — the foothold. The AP clerk received an email styled as a Microsoft 365 password reset notice. She had been getting more spam than usual and assumed it was legitimate. She clicked the link, typed her password into a convincing copy of the Microsoft sign-in page, and then typed it again when the page told her it had failed. Two minutes later her credentials were on a credential broker's panel for $4.
Weeks one through six — the watch. The attacker logged in from a residential VPN that geolocated near her actual home. They added a single invisible mailbox rule that quietly forwarded copies of any email containing the words "invoice," "wire," "payment," or "bank" to a folder they could read remotely. They never sent an email from her account. They never deleted anything. The clerk noticed nothing.
Week six — the right invoice. A $185,000 invoice came in from the firm's primary steel supplier — a vendor relationship of eleven years, with whom they exchanged dozens of emails a month. The attacker had already seen prior invoices from this vendor and knew the format, the contact name, and the approval pattern. They waited two days, then sent a reply on the existing email thread from a near-identical lookalike domain (one letter off in the supplier's name), saying the supplier had changed banks and providing new routing details. The lookalike email referenced the actual invoice number, attached a real-looking "updated remittance instructions" PDF, and ended with the supplier rep's real email signature.
Wednesday afternoon — the wire. The AP clerk noted the bank change in her ERP, attached the PDF, and sent the wire approval to the operating partner. The partner — who was at a trade show in a different state — approved it from his phone in between meetings. The wire went out at 3:47 PM. The receiving account moved the funds through two intermediary accounts within 36 hours.
The following Thursday — the call. The real steel supplier's controller called to ask when payment was coming. The AP clerk pulled up the wire confirmation. The two numbers did not match. Within an hour the firm's bank confirmed the routing on file at the receiving account was at a small online bank the supplier had never used. By the end of the day the FBI IC3 report was filed, the bank had begun the clawback process, and the firm was on the phone with their cyber insurance broker.
Days 10 to 21 — the claim. The insurance carrier opened a claim file, requested the original application, and asked one specific question: produce evidence that MFA was enforced on the AP clerk's account on the date of compromise. The owner asked his IT vendor. The IT vendor confirmed MFA was available in the M365 tenant but had never been enforced outside of the partners. The clerk had a password and nothing else. The carrier denied the claim citing the application's representation of MFA as a material misstatement.
Day 28. The receiving bank had recovered $12,000 from the third intermediary account before the funds moved. The remainder was gone — withdrawn in cash across multiple jurisdictions over the course of a long weekend. Net loss after recovery and remediation: $270,000. Insurance contribution: zero.
Three months later. The firm renewed cyber insurance at a 90 percent premium increase, with a documented MFA enforcement attestation as a precondition. They rebuilt their AP workflow with a mandatory phone-call verification step before any change to vendor banking information. The AP clerk kept her job — none of this was her fault.
What it cost
The bill, itemized
Wire fraud — funds stolen
$185,000Vendor invoice for steel coils. Attacker swapped the routing and account numbers mid-thread. Wired same day.
Recovered from receiving bank
($12,000)Out of $185K. Funds were moved through 3 intermediary accounts within 36 hours. Most withdrawn in cash.
DFIR + forensic investigation
$28,000Determine scope, identify every email read by the attacker, confirm no other inboxes were compromised.
Email system rebuild + identity hardening
$22,000Enforced MFA on all accounts, conditional access policies, anti-impersonation rules, mailbox audit logging.
Cyber insurance premium increase (3-year)
$32,000Renewal jumped 90% YoY despite no claim paid. Carrier required documented MFA enforcement to renew.
Internal audit + finance process rebuild
$15,000AP segregation of duties, mandatory call-back verification on vendor banking changes, ERP controls.
Total estimated
$270,000Net loss after $12K recovery. Cyber insurance covered $0. Owner absorbed every dollar.
What we did
EFROS-style response — what an engagement looks like
First call — preserve evidence. Before anything else, we pull a full mailbox audit log for the compromised account and freeze its state. Most BEC claims fail not because the carrier wants to deny — they fail because the evidence the carrier needs has been deleted by the IT vendor "cleaning up" the account in the first 24 hours.
Day 1 — clawback window. We coordinate with the firm's bank to file a financial fraud kill-chain (FFKC) request through FBI IC3 if it falls inside the 48-hour window. Inside the window, even partial recovery is possible; outside, almost never.
Days 2 to 5 — scope the compromise. We map every email the attacker read, every mailbox rule they created, every external IP that logged into the account, and every other account in the tenant they touched. We then sweep the rest of the organization for the same attacker indicators — BEC crews rarely compromise just one mailbox.
Days 5 to 10 — identity rebuild. We enforce MFA across every identity, not just the partners. We configure conditional access policies that require MFA on every login from outside a trusted location, enable mailbox audit logging across the tenant, set up anti-impersonation policies for the firm's top vendors and customers, and deploy a phishing-resistant authenticator for the AP and finance team.
Week 3 — finance process redesign. The technology fix is the easy part. We work with the owner's controller to redesign the AP workflow: a mandatory call-back to a known phone number before any change to vendor banking information, dual approval for wires over a threshold, and an ERP rule that flags banking changes for review at the next month-end close.
Insurance application rewrite. We help the owner's broker rewrite the next year's cyber insurance application — accurately, with evidence behind every yes. The premium still rises, but the policy now actually covers the business.
What you should take from this
Five things to do this week
- 01
BEC is not phishing the partner. It is silent surveillance of the AP clerk for weeks, identifying a real invoice already in motion, and changing two lines of text on the right day. By the time the wire goes out, nothing looks unusual.
- 02
Cyber insurance applications are not paperwork — they are the policy. If you wrote MFA on the application meaning 'we have it available,' the carrier reads it as 'enforced organization-wide.' At claim time they want screenshots, audit logs, and a dated enforcement policy.
- 03
The control that would have stopped this is not technology — it is a phone call. A mandatory call-back to a number you already had on file before any change to vendor banking, every time. Most manufacturers do not have this policy and the ones that do do not enforce it.
- 04
Recovery on a wire is hours, not days. The receiving bank can sometimes claw back if you call within the same business day. After 36 hours, the money is gone in 95% of cases.
- 05
The attacker did not need to compromise the partner. They compromised the AP clerk and learned the partner's signature, the vendor's name, the typical wire amounts, the approval pattern, and the partner's vacation schedule. They struck the week the partner was at a trade show.
The 60-second self-check
Three yes/no questions
If any answer is no — or any answer is "I think so" — you have the same exposure profile as the manufacturer in this story.
1. If your AP clerk's email is compromised tonight, does MFA — actually enforced, not just available — stop the attacker from reading her mailbox from a different country?
If MFA is configured but not enforced for that account, the answer is no.
2. Does your finance team have a written, signed-off policy requiring a phone call to a known number before any wire goes to a new or changed account?
Not a guideline. A policy with a name on it.
3. Pull last year's cyber insurance application. Does what you wrote match what an auditor would see today?
If the application said MFA, encryption, training, or backups — could you produce evidence that those things were enforced on the day of an incident?
What this would cost you
Three private numbers, none of them require talking to a salesperson.
Related incident stories
Two more patterns owners ask about
Regional law firm
Ransomware — 11 days down, $2.4M cost
Tuesday phishing email to the bookkeeper. Friday encryption. Eight days to find out what the backups actually contained.
CPA tax + advisory firm
AI data exposure — 31% of A-tier clients lost
An associate pasted client tax documents into consumer ChatGPT to summarize. Consumer-tier retains for training. Two weeks of SSNs and tax returns were in the pipeline before anyone noticed.
Names, locations, and identifying details changed. Numbers represent typical ranges from EFROS engagements; specific cases vary. Nothing on this page is legal advice.