How to deal with internal BEC

BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.