{"version":"1.0","provider_name":"CyberGuard 6 Blog","provider_url":"https:\/\/www.cyberguard6.com\/blog","title":"Perfect Data Software - BEC Data Exfiltration Tool","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bt4gbXqU2E\"><a href=\"https:\/\/www.cyberguard6.com\/blog\/perfect-data-bec\/\">Perfect Data Software &#8211; BEC Data Exfiltration Tool<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberguard6.com\/blog\/perfect-data-bec\/embed\/#?secret=bt4gbXqU2E\" width=\"600\" height=\"338\" title=\"&#8220;Perfect Data Software &#8211; BEC Data Exfiltration Tool&#8221; &#8212; CyberGuard 6 Blog\" data-secret=\"bt4gbXqU2E\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberguard6.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/mt-sample-background.jpg","thumbnail_width":1920,"thumbnail_height":1280,"description":"Perfect Data Software, originally designed for mailbox backup, is increasingly exploited by cybercriminals to facilitate Business Email Compromise (BEC) attacks. Learn how attackers use it within Microsoft 365 and Azure environments to exfiltrate sensitive data and discover proactive security measures to mitigate risks."}