"Scripted Sparrow" BEC Group Targets Finance Teams with Highly Structured Attacks

Fortra Uncovers "Scripted Sparrow," a Persistent BEC Group Targeting Finance Departments in North America and Europe

HIGH
December 18, 2025
4m read
Threat ActorPhishingCyberattack

Related Entities

Threat Actors

Scripted Sparrow

Organizations

Fortra

Full Report

Executive Summary

Security researchers at Fortra have identified a highly organized Business Email Compromise (BEC) operation named Scripted Sparrow. Active since at least June 2024, this group distinguishes itself from opportunistic actors through its disciplined, consistent, and targeted campaigns aimed at finance and accounts payable departments across North America and Europe. The group's primary tactic involves sending expertly crafted phishing emails containing fake invoices for services like consulting or coaching. These emails often include forged internal approval chains to deceive recipients into processing fraudulent wire transfers. The operation's consistency and use of a vast network of money mules suggest a structured criminal enterprise focused on financial theft.


Threat Overview

Scripted Sparrow operates with a clear and repeatable playbook, focusing on social engineering rather than technical exploits. Their attacks are characterized by a high degree of credibility and personalization.

  • Attack Vector: The campaign begins with a spearphishing email (T1566.002 - Spearphishing Link) sent to employees in finance or accounts payable roles.
  • Impersonation: The emails convincingly impersonate legitimate professional services firms, often referencing overdue payments for consulting or coaching.
  • Social Engineering: The core of the deception is a forged email thread included in the message. This thread makes it appear as if a senior executive within the victim's own company has already approved the payment and is instructing the finance employee to process it urgently.
  • Scale and Targeting: While the daily volume of 10,000 to 50,000 emails is modest for a phishing campaign, the attacks are sent in small, targeted batches, increasing their effectiveness and reducing the chance of being blocked by spam filters.
  • Monetization: The group uses a large and distributed network of money mules to receive the fraudulent funds. Fortra identified 249 unique bank accounts at 42 different U.S. financial institutions used for cash-outs.

Technical Analysis

The Scripted Sparrow campaign is an example of classic BEC fraud that relies almost entirely on social engineering (T1656 - Impersonation). The lack of malicious attachments or links makes it difficult for automated email security gateways to detect. The attackers' success hinges on their ability to create a believable pretext and exploit human trust and established business processes.

The consistency in the email templates, language, and overall structure across 512 observed variants suggests a single, organized group with a defined operational methodology. This is not the work of disparate, opportunistic attackers but a disciplined team with specific roles for reconnaissance, campaign execution, and money laundering.

Impact Assessment

The primary impact of a successful Scripted Sparrow attack is direct financial loss, which can range from thousands to millions of dollars per incident. Additional impacts include:

  • Resource Drain: Investigating the incident, attempting to recover funds, and dealing with law enforcement consumes significant time and resources.
  • Reputational Damage: If the fraud becomes public, it can damage the company's reputation and erode trust with partners and clients.
  • Regulatory Scrutiny: Large-scale fraud may trigger regulatory reviews, particularly in the financial sector, regarding internal controls.

Detection & Response

  • Email Analysis: Scrutinize any unexpected payment requests, even if they appear to come from a known vendor or have internal approval. Look for subtle signs of spoofing, such as slight variations in domain names or 'reply-to' addresses that differ from the 'from' address.
  • Out-of-Band Verification: Implement a strict policy requiring out-of-band verification for any unusual payment requests or changes to vendor payment details. This means contacting the supposed sender (e.g., the executive or vendor) via a known, trusted channel like a phone call to confirm the request's legitimacy.
  • D3FEND Technique - D3-UBA: User Behavior Analysis: While difficult for a single email, UBA can help identify compromised accounts if the attackers use them to send internal requests, by flagging unusual login locations or email patterns.

Mitigation

  • User Training (M1017 - User Training): This is the most critical defense against BEC. Conduct regular, specific training for finance and executive staff on how to spot and respond to BEC attacks. Use real-world examples from the Scripted Sparrow campaign.
  • Process Hardening: Strengthen financial controls. Require multi-person approval for all wire transfers above a certain threshold. Implement a formal process for verifying and changing vendor bank account information that cannot be done via email alone.
  • Email Security: Deploy advanced email security solutions that use AI and machine learning to detect signs of impersonation, social engineering language, and other indicators of BEC, even in the absence of a malicious payload.
  • DMARC, DKIM, SPF: Ensure these email authentication standards are properly configured to prevent direct domain spoofing.

Timeline of Events

1
June 1, 2024
Scripted Sparrow's campaign is believed to have started.
2
January 1, 2025
Fortra researchers began observing repeat sightings of the campaign across various industries.
3
December 18, 2025
This article was published

MITRE ATT&CK Mitigations

The most effective defense against BEC is training employees, especially in finance, to recognize social engineering tactics and to verify payment requests out-of-band.

Audit

M1047enterprise

Implementing and enforcing strict financial auditing processes, such as multi-party approval for wire transfers, can prevent fraudulent payments from being made.

Mapped D3FEND Techniques:

Configuring email authentication standards like DMARC, DKIM, and SPF helps prevent email spoofing, a common element in BEC attacks.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat BEC attacks like those from Scripted Sparrow, which rely on impersonation rather than malware, organizations must focus on process and behavior. The most effective countermeasure is a non-technical one: mandatory out-of-band verification for all payment requests that are unusual, urgent, or involve a change in vendor details. Finance staff must be trained to never trust an email alone. They must verify the request by calling a known, trusted phone number for the executive or vendor supposedly making the request. This breaks the attack chain, as the fraudster cannot intercept a phone call. This should be a formal, documented policy that is regularly audited for compliance. Combining this human process with advanced email security gateways that flag impersonation attempts can provide a robust, layered defense.

Strengthen financial processes by implementing authorization thresholds. For example, any wire transfer request over a specific amount (e.g., $10,000) must require approval from at least two separate individuals. This 'two-person rule' for financial transactions is a powerful compensating control against BEC. Even if one employee is successfully tricked by a Scripted Sparrow email, the second approver provides another opportunity to scrutinize the request and identify the fraud. This process should be integrated into the accounting software workflow, making it a mandatory step that cannot be bypassed. This directly hardens the business process that the attackers are targeting.

Sources & References

Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Help Net Security (helpnetsecurity.com) December 18, 2025
Fortra Details ‘Scripted Sparrow,’ a Highly Organized BEC Operation
SecurityWeek (securityweek.com) December 18, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BECBusiness Email CompromisePhishingWire FraudSocial EngineeringScripted Sparrow

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading