incident-response-bec

Installation
SKILL.md

Business Email Compromise and AiTM Analysis

Mission

Determine whether a Microsoft identity and mailbox event is consistent with BEC, AiTM session theft, or another compromise pattern. Keep the assessment advisory; final decision belongs to the human analyst.

Use when

  • Suspicious sign-ins are paired with mailbox forwarding, inbox rules, or unexpected sent mail.
  • A user reports phishing, strange mailbox behavior, or external recipients the user did not send to.
  • The incident includes suspected session theft, token replay, or unauthorized app consent.
  • The same workflow applies to non-Microsoft cases when equivalent sign-in and mailbox evidence exists.

Required context

  • Preferred inputs: UPN, incident window, alert or incident ID, and any phishing message identifiers.
  • If UPN is missing and Microsoft telemetry is required, ask for it before querying.

Investigation flow

  1. Confirm the compromise hypothesis
    • identify the first suspicious sign-in or mailbox event
    • note source IP, geo, ASN, device, client app, and MFA context
Related skills

More from crtvrffnrt/skills

Installs
6
GitHub Stars
1
First Seen
Apr 20, 2026