One spoofed email. One fake wire transfer. Thats all it takes.
For many law firms, the most financially damaging cyber risk isnt ransomware its Business Email Compromise (BEC): attackers quietly hijacking or impersonating your email to redirect money and data.
The FBIs Internet Crime Complaint Center (IC3) has the numbers to prove it. Year after year, BEC is at or near the top of reported cybercrime losses. The dollar impact dwarfs ransomware.
If your firm uses email to coordinate wire transfers, settlements, or trust account disbursements, BEC isnt a theoretical risk. Its the main event.
Lets break down how it works, what it looks like in a Microsoft 365based practice, and what meaningful law firm cybersecurity looks like in 2026.
How Business Email Compromise Actually Works
Most BEC attacks against firms follow a familiar pattern.
1. Getting In
The attacker gains mailbox access via:
- A convincing phishing email (fake Microsoft 365 login)
- Password reuse from another breached site
- Weak or missing multifactor authentication
2. Sitting Quietly
Once theyre in, they dont start spraying spam. They sit and watch:
- Who authorizes payments
- How wires are requested and approved
- Which matters involve large or timesensitive transfers
3. Hijacking Real Conversations
When the moment is right, they step in:
- They send from the compromised account, or
- They register a lookalike domain (for example,
myfirmlegal.comvsmyfirmlegal.com).
They reply on existing threads, copying your style, disclaimers, and process.
4. Redirecting Money
Finally, they send updated wiring instructions or new account details that look completely legitimate.
By the time anyone realizes something is wrong, the funds are sitting in an account outside the country and the banks options are limited.
Why Law Firms Are Prime Targets
From an attackers point of view, firms are ideal:
- You move large sums of money through trust accounts and wires.
- Email is often considered good enough for approvals.
- Transactions are timesensitive; pressure and urgency are normal.
- IT is often focused on uptime and ediscovery, not deep security monitoring.
In other words: highvalue transactions + high trust in email + inconsistent monitoring.
If an attacker can spend a few days inside one partners mailbox and successfully redirect a single sixfigure transfer, the return is enormous.
Thats why BEC law firm attacks are so common. The economics are too good for attackers to ignore.
What BEC Looks Like in Your Systems
The actual fraud email is often the last step. The story starts much earlier with smaller technical breadcrumbs:
- New inbox rules that forward or hide emails involving wire, invoice, payment, ACH, etc.
- Logins from unusual countries or locations
- Multiple mailboxes accessed from the same suspicious IP
- Unusual download patterns (for example, mass export of mail or files)
A basic Microsoft 365 setup will happily log these events and never say a word.
A serious business email compromise legal defense depends on actively monitoring those behaviors.
What Your MSP Should Be Watching in Microsoft 365
You dont need to become a security analyst, but you should know what your IT partner is (or isnt) monitoring.
Here are 14 conceptual detection rules a competent MSP should have in place for BEC in a Microsoft 365 tenant:
- Impossible travel logins Same user logging in from distant locations in an impossible timeframe.
- Logins from highrisk countries Especially regions where your firm has no business.
- Multiple failed logins followed by success Suggesting password spraying or testing stolen credentials.
- New inbox rules that hide or forward mail Particularly rules targeting financerelated terms.
- Inbox rules forwarding all mail externally A common tactic for longterm mailbox surveillance.
- Creation of tenantlevel forwarding rules Transport rules that send copies of mail offtenant.
- New OAuth app consent with broad permissions Malicious apps granted rights to read or send mail.
- Unusual mass mailbox access A single account accessing mailboxes it normally doesnt.
- Privilege escalations New admin roles assigned to accounts that previously lacked them.
- Suspicious send patterns Large bursts of outbound mail or unusual recipients for a given user.
- New devices or locations for key accounts Partners and finance staff suddenly logging in from odd geographies.
- Mail sent from unfamiliar IPs Especially when it bypasses your normal VPN or office networks.
- Transport rule changes Particularly ones that bypass spam/phishing filters or reroute mail.
- Unusual file access Mass downloads or access to sensitive SharePoint/OneDrive locations tied to a user.
On their own, any one of these might be benign. Together, theyre the difference between normal Tuesday and we just wired money to a criminal.
Tools Without Process Arent Enough
Even the best detection doesnt help if firm processes assume email instructions are always trustworthy.
A realistic law firm cybersecurity approach includes:
- Callback verification for changes to payment details, using a known good phone number (not whats in the email signature).
- Clear wire procedures that define who can request, who can approve, and how changes are validated.
- Firmwide MFA for all accounts, with extra protection on partners, finance, and IT.
- Targeted security awareness training that uses real examples from legal workflows.
Technology backs up those processes; it doesnt replace them.
What We Do for Firms We Support
At Beshore IT, we treat BEC as the primary threat model for our law firm clients.
In practical terms, that means:
- Enforcing firmwide MFA and sensible conditional access policies
- Sending Microsoft 365, endpoint, and firewall logs into our Wazuhbased SIEM
- Tuning detection rules around the 14 patterns above
- Investigating and responding to alerts by:
- Forcing signouts and password resets
- Disabling accounts when warranted
- Reviewing mailbox rules and access history
- Working with firm leadership to tighten wire and payment verification procedures
The goal is simple: make your firm a very unattractive target for attackers looking for an easy BEC payout.
Questions to Ask Your Current IT Provider
If you want a real sense of your exposure, ask these directly:
- What are we doing specifically to detect Business Email Compromise in our Microsoft 365 tenant?
- Do we have alerts for inbox rule changes, forwarding rules, and suspicious login patterns?
- Are we sending M365 logs into a SIEM, or just relying on Microsofts builtin alerts?
- Can you show us the last few security incidents you investigated for our firm and how you responded?
- What is our documented process for verifying changes to wiring instructions?
If the answers are vague or heavy on marketing buzzwords, you probably dont have the coverage you assume you do.
BEC Is a Business Risk, Not Just an IT Problem
A successful BEC incident hits more than your network. It affects:
- Client trust especially around highvalue matters and real estate transactions.
- Professional liability depending on circumstances and response.
- Cash flow if trust accounts or major disbursements are involved.
Thats why BEC belongs in your risk management discussions, not just on ITs todo list.
You dont need a huge internal security team. You do need:
- The right monitoring in place
- An MSP that understands law firm workflows and BEC patterns
- Clear internal processes that treat email as untrusted for moving money
If youre not comfortable with your answers to those five questions above, thats a sign its time to tighten things up before one spoofed email turns into a sixfigure mistake.