Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCase Studies
Stamm Technologies

You’ve Not Got Mail

The Strange Case of Missing Letters and Multi-Factor Authentication

Download Case Study
Threats Encountered

Business Email Compromise

Malicious Inbox Rules

How Huntress Managed ITDR helped step in and stop an attempt at business email compromise.

“We had no concept of how deep this went. How could we? We were just talking about mailbox rules! But it wasn’t a simple case of an account being infiltrated and spam being sent, it was far more coordinated than that. It could have done serious damage.”

The digital world doesn’t exist in a vacuum. It’s not like Vegas: what happens online most certainly won’t stay online. And while most of us grasp this fact, the extent to which it makes the leap from digital to physical reality depends on the success – and sophistication – of the attack.

But what if it could work the other way around? What if a cyber threat alert could uncover, rather than lead to, a bigger crime, one that was very much already in the physical realm?

When – and how – does cybersecurity translate into physical security?

Learn More About Stamm Tech

Take It From the Top

“Our first clue was a notification from Huntress,” says Bryan Heindel, director of IT at Stamm Tech in Milwaukee. “It was only our first week of rolling out its Managed Identity Threat Detection and Response solution when it flagged a client account for a battery backup seller.”

It wasn’t just anyone’s account, either.

“It belonged to the CEO of that company,” Heindel elaborates. “There had been some suspicious activity: namely, some inbox rules had been created, redirecting senders to the RSS feeds folder and specifically to two bank domains.”

The direction of travel was evident – and frightening. Heindel knew they had to act fast.

‍

‍

“One of our team members quickly reached out to let them know and discuss next steps,” he says. “They were advised to go through their logins, check their access points, and reset their passwords. Thankfully, Huntress was able to clean up the rules automatically. All in all, the downtime only amounted to about an hour at most, as we worked to reestablish multi-factor authentication (MFA) and clean up any additional MFA devices that weren’t recognized.”

The coast was clear, right? Not quite. As the pair continued talking, a curious picture was

starting to emerge.

“The more the CEO thought on it, the less isolated the incident seemed,” says Heindel. “They mentioned that physical mail had also coincidentally been going missing. It was then that they had a scary realization: they hadn’t received any mail from their bank for weeks.”

‍

On the Money

The client immediately got in touch with their bank. Sure enough, a storm was brewing.

“They discovered that there had been attempts to add an authorized user to their bank account,” Heindel says. “From there, wire transfers could have been made. Even obtaining a login to the banking site would have allowed the attacker to zero in on other aspects of the business, or access other tools and services. Had we not contacted the client, they wouldn’t have made the connection. Things likely would have got much, much worse.”

Did Huntress’ initial detection just foil a wider extortion plot? Heindel certainly believes so.

“We had no concept of how deep this went,” he says. “How could we? We were just talking about mailbox rules! But it wasn’t a simple case of an account being infiltrated and spam being sent, it was far more coordinated than that. It could have done serious damage. Who knew what else they could have gained access to?”

Even more alarming was the precision of the attack. Though Huntress had caught the attackers in the act before they were able to redirect via email, they had already managed that via physical mail.

“The criminals were concentrating on banks that the client used,” says Heindel. “It wasn’t just typical, generic bank addresses or email accounts. That information was known.

“Without Huntress, we wouldn’t have picked up on anything until the client was having far more issues,” he continues. “Its Security Operations Center (SOC) works around the clock, meaning even the smallest change or potential threat is detected. When we first spoke, they were experiencing some difficulties trying to sign in, thanks to Huntress’ early remediation efforts, but nothing else. They were surprised to hear from us at all. It was so subtle.”

Huntress’ Managed ITDR solution is specifically designed to identify behavioral signs, like creating suspicious inbox rules, helping detect malicious activity early. And with the full backing of the Huntress SOC, identities can be isolated as soon as suspicious activity is detected, so the attackers can’t do more damage. Plus, you can be notified of threats in a variety of ways – via ticketing system, email, automated call, or even a text message – to ensure you never miss anything critical.

“When someone calls and says they’re not getting any emails, then you know there’s a problem,” states Heindel. “But to be able to narrow it down to not receiving emails from two banking sites in particular? It could have been weeks before anyone was aware. Ours would have been a more reactive approach, as opposed to the proactive approach we were able to take.”

‍

‍

‍

“They were advised to go through their logins, check their access points, and reset their passwords. Thankfully, Huntress was able to clean up the rules automatically. All in all, the downtime only amounted to about an hour at most, as we worked to reestablish multifactor authentication (MFA) and clean up any additional MFA devices that weren’t recognized.”

‍

“Huntress flips the script on how we manage threats. You don’t need to be specialized in how the product works – any technician can take a look at what’s going on and it all makes sense. It really accelerates the resolution process: in this instance, the client was contacted in just five minutes, and back up and running in an hour."

‍

Target Acquired

What does Heindel take away from this close call?

“MFA isn’t bulletproof,” he offers. “It can be very beneficial, but it’s not the be-all and end-all in cybersecurity. It can be susceptible to attack. Just because MFA is enabled, it doesn’t mean that you can ease up on your protection. I’ve received tickets after the fact where Huntress had double checked something that had previously been resolved and reported that an additional iPhone was added on the same day for MFA detection.”

Huntress’ meticulous, 24/7 monitoring by dedicated experts, Managed Identity Threat Detection and Response, and a razor-sharp-focused remediation plan were key to fending off financial ruin for the client. This robust suite of capabilities strengthened Stamm’s overall security stack, integrated well with the company’s existing tools and, most crucially, didn’t call for labor-intensive attention from the team. There wasn’t time to analyze complex data.

“We were on SentinelOne for about four years before it became a challenge to sort through all the data,” explains Heindel, of the firm’s decision to adopt Huntress. “We were getting a lot of false positives, or worse, what seemed like false positives turning out to be very real positives requiring urgent attention."

“We began looking at alternatives. I’d been hearing about Huntress for a long time and when it came to deciding whether to add more features to SentinelOne or to switch products altogether, it just made more sense to switch, especially with the significant price difference.”

“Huntress flips the script on how we manage threats,” he summarizes. “You don’t need to be specialized in how the product works – any technician can take a look at what’s going on and it all makes sense. It really accelerates the resolution process: in this instance, the client was contacted in just five minutes, and back up and running in an hour.

“To have that kind of instant intel from a partner like Huntress, with very little doubt in its accuracy, is invaluable.”

‍


Stamm Tech
Contact
Bryan Heindel
Location
Milwaukee, WI
About

Stamm Tech, a Milwaukee-based IT service organization, embodies its own philosophy of ‘whatever IT takes’.
Committed to providing cutting-edge IT services, its mission is to deeply understand an organization’s goals and deliver tailored solutions that align seamlessly with its business objectives. Passionate and warm in its approach, Stamm Tech aims to be a go-to advisor, leveraging technology to help fulfill any company’s mission.
The exceptional team, ever inspired by the commitment to do ‘whatever IT takes’, ensures that each individual’s efforts make a significant contribution. Stamm Tech prioritizes relationship continuity, assigning each client a dedicated technical account manager and IT manager, who genuinely engages with the team and business. Valuing reputation over profits, Stamm Tech focuses on earning clients for life, through stellar customer service and regular business reviews.
At Stamm Tech, it’s not just about technology, it’s about making a positive impact on an organization’s business journey.

Share this Success Story

Download Case Study
Share

Other Case Studies

  • Cloak and Dagger: Unmasking a Cyber Villain
    Cloak and Dagger: Unmasking a Cyber Villain
    See how Cascade Technologies was notified about the presence of a remote access Trojan and, with the help of Huntress, responded before there was any serious impact.
  • One Click from Catastrophe
    One Click from Catastrophe
    Learn more about Trumbull Tech and Huntress Managed ITDR helped an Accountant avoid financial ruin.
  • One Suspicious Login. One Client in Jeopardy. One Expert Team on the Hunt.
    One Suspicious Login. One Client in Jeopardy. One Expert Team on the Hunt.
    Learn how Huntress’ Managed Identity Threat Detection and Response cracked the case for a New Zealand IT service provider.
  • How Do You Sleep at Night?
    How Do You Sleep at Night?
    For UK-based managed service provider Greystone Technology, Huntress is more than just a product – it’s peace of mind.
  • Real-World Results
    Real-World Results
    Protect your cloud environment with Huntress Managed ITDR, enterprise-grade identity threat detection that saves time and closes expertise gap
  • Securing Smiles
    Securing Smiles
    How Cytek saved a dental surgery practice threatened by data extraction, thanks to the 24/7 vigilance of Huntress.
  • Stopping a Banking Trojan in Its Tracks
    Stopping a Banking Trojan in Its Tracks
    Binatech Uses Huntress to Protect SMBs & Stop a Banking Trojan, Qakbot, in its Tracks
  • Beyond the Tools
    Beyond the Tools
    When hackers set their sights on businesses across the Netherlands, Connectworks had a tough choice—adapt or risk it all. With more than 7,000 endpoints protected by only antivirus tools, they needed Huntress.
  • RAFTRx
    RAFTRx
    Huntress plays a critical role in RAFTRx's business growth, providing cybersecurity expertise. This collaboration positions cybersecurity as a key driver for RAFTRx's expansion.

Add Cyber Experts to Your Arsenal

See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.

Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy