detecting-business-email-compromise-with-ai
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.
Best use case
detecting-business-email-compromise-with-ai is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.
Teams using detecting-business-email-compromise-with-ai should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/detecting-business-email-compromise-with-ai/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How detecting-business-email-compromise-with-ai Compares
| Feature / Agent | detecting-business-email-compromise-with-ai | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agent for Cold Email Generation
Discover AI agent skills for cold email generation, outreach copy, lead personalization, CRM support, and sales-adjacent messaging workflows.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
Best AI Agents for Marketing
A curated list of the best AI agents and skills for marketing teams focused on SEO, content systems, outreach, and campaign execution.
SKILL.md Source
# Detecting Business Email Compromise with AI ## Overview AI-powered BEC detection uses machine learning, NLP, and behavioral analytics to identify sophisticated impersonation attacks that contain no malicious links or attachments. Traditional rule-based filters miss these attacks because BEC relies purely on social engineering. Modern AI approaches analyze writing style, tone, vocabulary, grammatical patterns, and behavioral context to determine if an email genuinely comes from the stated sender. BERT-based models achieve 98.65% accuracy in BEC detection, and AI-enhanced platforms show a 25% increase in phishing identification over keyword-based rules. ## When to Use - When investigating security incidents that require detecting business email compromise with ai - When building detection rules or threat hunting queries for this domain - When SOC analysts need structured procedures for this analysis type - When validating security monitoring coverage for related attack techniques ## Prerequisites - AI-powered email security platform (Abnormal Security, Tessian, Microsoft Defender) - Historical email data for baseline training (minimum 30 days) - Integration with email platform (Microsoft 365 or Google Workspace) - SIEM for alert correlation and investigation - Understanding of BEC attack types (FBI IC3 classification) ## Workflow ### Step 1: Deploy AI Email Security Platform - Select API-based solution (Abnormal Security, Tessian, Ironscales) or enhance existing SEG - Connect to Microsoft Graph API or Google Workspace API - Allow 48-hour baseline learning period on historical email data - Configure integration to scan inbound, outbound, and internal email - Verify API permissions for message access and remediation ### Step 2: Configure Behavioral Baselines - AI learns normal communication patterns: who emails whom, frequency, tone - Establish writing style profiles for each user (vocabulary, sentence structure) - Map typical request types per role (finance processes payments, HR handles PII) - Baseline email metadata: typical sending times, devices, locations - Flag deviations from established baselines as anomalous ### Step 3: Train NLP Models for BEC Detection - Deploy transformer-based models (BERT, GPT) for email content analysis - Detect urgency and manipulation language patterns - Identify mismatches between sender identity and writing style - Analyze sentiment shifts indicating social engineering pressure - Classify email intent: information request, payment request, credential request ### Step 4: Configure Detection Policies - VIP impersonation: AI compares new email against known executive communication patterns - Vendor impersonation: detect payment change requests from vendor lookalike domains - Account compromise: detect sudden changes in employee email behavior - Supply chain BEC: monitor for impersonation of trusted partners - Configure confidence thresholds for auto-block vs. warning banner vs. analyst review ### Step 5: Integrate with Response Workflow - Auto-quarantine high-confidence BEC detections - Add warning banners for moderate-confidence detections - Route suspicious emails to SOC analyst queue for review - Integrate with SOAR for automated response playbooks - Feed BEC verdicts back into training data for model improvement ## Tools & Resources - **Abnormal Security**: API-based AI email security with behavioral analysis - **Microsoft Defender for O365**: Built-in AI anti-BEC with Impostor Classifier - **Tessian (Proofpoint)**: AI-powered email security with human layer protection - **Ironscales**: AI + human-in-the-loop BEC detection - **Darktrace Email**: Self-learning AI for email threat detection ## Validation - AI detects test BEC email with no malicious indicators (pure social engineering) - Writing style analysis identifies impersonation of known executive - Behavioral baseline flags unusual payment request from compromised account - NLP correctly classifies urgency manipulation in test scenario - False positive rate below 0.05% after baseline training - Detection rate exceeds traditional rule-based filters by 25%+
Related Skills
testing-for-email-header-injection
Test web application email functionality for SMTP header injection vulnerabilities that allow attackers to inject additional email headers, modify recipients, and abuse contact forms for spam relay.
testing-for-business-logic-vulnerabilities
Identifying flaws in application business logic that allow price manipulation, workflow bypass, and privilege escalation beyond what technical vulnerability scanners can detect.
performing-active-directory-compromise-investigation
Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.
investigating-phishing-email-incident
Investigates phishing email incidents from initial user report through header analysis, URL/attachment detonation, impacted user identification, and containment actions using SOC tools like Splunk, Microsoft Defender, and sandbox analysis platforms. Use when a reported phishing email requires full incident investigation to determine scope and impact.
implementing-proofpoint-email-security-gateway
Deploy and configure Proofpoint Email Protection as a secure email gateway to detect and block phishing, malware, BEC, and spam before messages reach user inboxes.
implementing-email-sandboxing-with-proofpoint
Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware and evasive phishing payloads. Proofpoint Targeted Attack Protection (TAP) is an industry
implementing-dmarc-dkim-spf-email-security
SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate message integrity, and define policies for handling unauthenticated mail. Proper im
hunting-for-supply-chain-compromise
Hunt for supply chain compromise indicators including trojanized software updates, compromised dependencies, unauthorized code modifications, and tampered build artifacts.
detecting-wmi-persistence
Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.
detecting-typosquatting-packages-in-npm-pypi
Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using Levenshtein distance and other string metrics, examining publish date heuristics to identify recently created packages mimicking established ones, and flagging download count anomalies where suspicious packages have disproportionately low usage compared to their legitimate targets. The analyst queries the PyPI JSON API and npm registry API to gather package metadata for automated comparison. Activates for requests involving package typosquatting detection, dependency confusion analysis, malicious package identification, or software supply chain threat hunting in package registries.
detecting-t1548-abuse-elevation-control-mechanism
Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.
detecting-t1055-process-injection-with-sysmon
Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.