A supplier appears to be have been a victim of an server breach (though they are denying this and bring the point of my question).
This has then caused the directors of our company to make a payment to the scammers.
From looking at an original email, this containing a doctored payment mandate PDF (notably this appears to be an original supplier document but the bank details have been altered, but other than this there is even the scan of the director signature on it),
The header of the email contain the following information (I'll just paste what I think is relevant);
ip is IP ADDRESS) smtp.rcpttodomain=.co.uk
smtp.mailfrom=SUPPLIER DOMAIN.com; dmarc=bestguesspass action=none
header.from=SUPPLIER DOMAIN.com; dkim=pass (signature was verified)
header.d=SUPPLIER DOMAIN.onmicrosoft.com; dkim=pass (signature was
verified) header.d=SUPPLIER DOMAIN.onmicrosoft.com; arc=pass (0
oda=1 ltdi=1 spf=[1,2,smtp.mailfrom=SUPPLIER DOMAIN.com]
dkim=[1,1,header.d=SUPPLIER DOMAIN.com] dmarc=[1,1,header.from=SUPPLIER
DOMAIN.com])
Authentication-Results: spf=pass (sender IP is IP ADDRESS)
smtp.mailfrom=SUPPLIER DOMAIN.com; dkim=pass (signature was verified)
header.d=SUPPLIER DOMAIN.onmicrosoft.com;dmarc=bestguesspass action=none
header.from=SUPPLIER DOMAIN.com;compauth=pass reason=109 Received-SPF: Pass
(protection.outlook.com: domain of SUPPLIER DOMAIN.com designates
IP ADDRESS as permitted sender) receiver=protection.outlook.com; client-ip=IP ADDRESS;
helo=EUR05-VI1-obe.outbound.protection.outlook.com; pr=C Received:
from EUR05-VI1-obe.outbound.protection.outlook.com (IP ADDRESS) by
CWLGBR01FT041.mail.protection.outlook.com (IP ADDRESS) with
Microsoft SMTP
As the supplier is stating no breach of their system has been made does this indicitively prove the opposite? As the email has come from their server and as such proves a breach of their system?
Equally as looking through the email trails the scammers registered a domain very similar to the suppliers bar transposing a character. They then mirror email addresses of many contacts from the supplier that existed. Does this again give more credance that they had access to their system?