Security researchers at Fortra have identified a highly organized Business Email Compromise (BEC) operation named Scripted Sparrow. Active since at least June 2024, this group distinguishes itself from opportunistic actors through its disciplined, consistent, and targeted campaigns aimed at finance and accounts payable departments across North America and Europe. The group's primary tactic involves sending expertly crafted phishing emails containing fake invoices for services like consulting or coaching. These emails often include forged internal approval chains to deceive recipients into processing fraudulent wire transfers. The operation's consistency and use of a vast network of money mules suggest a structured criminal enterprise focused on financial theft.
Scripted Sparrow operates with a clear and repeatable playbook, focusing on social engineering rather than technical exploits. Their attacks are characterized by a high degree of credibility and personalization.
T1566.002 - Spearphishing Link) sent to employees in finance or accounts payable roles.The Scripted Sparrow campaign is an example of classic BEC fraud that relies almost entirely on social engineering (T1656 - Impersonation). The lack of malicious attachments or links makes it difficult for automated email security gateways to detect. The attackers' success hinges on their ability to create a believable pretext and exploit human trust and established business processes.
The consistency in the email templates, language, and overall structure across 512 observed variants suggests a single, organized group with a defined operational methodology. This is not the work of disparate, opportunistic attackers but a disciplined team with specific roles for reconnaissance, campaign execution, and money laundering.
The primary impact of a successful Scripted Sparrow attack is direct financial loss, which can range from thousands to millions of dollars per incident. Additional impacts include:
D3-UBA: User Behavior Analysis: While difficult for a single email, UBA can help identify compromised accounts if the attackers use them to send internal requests, by flagging unusual login locations or email patterns.M1017 - User Training): This is the most critical defense against BEC. Conduct regular, specific training for finance and executive staff on how to spot and respond to BEC attacks. Use real-world examples from the Scripted Sparrow campaign.The most effective defense against BEC is training employees, especially in finance, to recognize social engineering tactics and to verify payment requests out-of-band.
Implementing and enforcing strict financial auditing processes, such as multi-party approval for wire transfers, can prevent fraudulent payments from being made.
Configuring email authentication standards like DMARC, DKIM, and SPF helps prevent email spoofing, a common element in BEC attacks.
To combat BEC attacks like those from Scripted Sparrow, which rely on impersonation rather than malware, organizations must focus on process and behavior. The most effective countermeasure is a non-technical one: mandatory out-of-band verification for all payment requests that are unusual, urgent, or involve a change in vendor details. Finance staff must be trained to never trust an email alone. They must verify the request by calling a known, trusted phone number for the executive or vendor supposedly making the request. This breaks the attack chain, as the fraudster cannot intercept a phone call. This should be a formal, documented policy that is regularly audited for compliance. Combining this human process with advanced email security gateways that flag impersonation attempts can provide a robust, layered defense.
Strengthen financial processes by implementing authorization thresholds. For example, any wire transfer request over a specific amount (e.g., $10,000) must require approval from at least two separate individuals. This 'two-person rule' for financial transactions is a powerful compensating control against BEC. Even if one employee is successfully tricked by a Scripted Sparrow email, the second approver provides another opportunity to scrutinize the request and identify the fraud. This process should be integrated into the accounting software workflow, making it a mandatory step that cannot be bypassed. This directly hardens the business process that the attackers are targeting.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats