13.9 Eradication
Eradication
Containment stopped the attacker’s access. Evidence is preserved under litigation hold. Now remove the persistence mechanisms. This follows the same pattern as M11.8 but includes BEC-specific items.
Required role: Exchange Administrator (inbox rules, forwarding). Authentication Administrator (MFA methods).
Pre-condition: Litigation hold MUST be active before eradication (subsection 13.7 Action 2). Verify: Get-Mailbox -Identity "a.patel@northgateeng.com" | Select LitigationHoldEnabled — must return True.
Action 1: Remove malicious inbox rules
Same procedure as M11.8 Action 1. For BEC, pay special attention to rules targeting financial keywords.
| |
Blast radius: Only the specified rules are removed. Per-rule scope.
Verify: Get-InboxRule -Mailbox "a.patel@northgateeng.com" | Where-Object { $_.ForwardTo -or $_.RedirectTo -or $_.DeleteMessage -eq $true }— should return zero financial-keyword rules.
Action 2: Remove mailbox forwarding and delegate permissions
| |
Action 3: Remove attacker MFA methods and OAuth consents
Same procedure as M11.8 Actions 3-4. Check for MFA methods registered from non-corporate IPs and OAuth application consents granted during the compromise period.
Action 4: Revert the fraudulent vendor bank details
Work with the finance team to revert the vendor record in the finance system to the original, verified bank details. Verify the original details by calling the vendor directly (subsection 13.8 vendor notification).
This is a business process action, not a technical action. But it is part of eradication — the fraudulent data in the finance system is a persistence mechanism. If not reverted, the next payment to this vendor will also go to the attacker’s account.
Eradication verification
After completing all actions, verify:
- No malicious inbox rules remain (PowerShell check).
- No mailbox forwarding active (Get-Mailbox check).
- No unauthorized delegate permissions (Get-MailboxPermission check).
- No attacker MFA methods registered (Entra ID authentication methods check).
- No malicious OAuth consents (Entra ID enterprise applications check).
- Vendor bank details reverted in finance system (finance team confirmation).
- No new sign-ins from non-corporate IPs (SigninLogs check).
Subsection artifact: The BEC eradication checklist including the vendor bank detail reversion step — unique to BEC and not covered in the AiTM eradication (M12.8).
Knowledge check
Comprehensive eradication verification
After completing all eradication actions, run this verification sequence:
| |
Every check must pass before eradication is considered complete. If any check fails: investigate the failure, remediate, and re-verify. Do not close the incident with outstanding eradication items — each one is a potential re-compromise vector.
The vendor bank detail reversion (check 4) is the most commonly forgotten BEC eradication step. It is not a technical action — it requires coordination with the finance team. But if the fraudulent bank details remain in the finance system, the next payment to that vendor goes to the attacker. Add this to your incident checklist as a mandatory sign-off item.
Post-eradication monitoring. Continue the Livestream from containment (13.7) for 48 hours after eradication. If the attacker returns: a persistence mechanism was missed or a new compromise has occurred.
Check your understanding
1. You have removed all inbox rules, forwarding, and delegate permissions. Is eradication complete?