How to investigate a Phishing Email?

A step-by-step guide!

Suzanne
3 min readJan 26, 2024

--

How to Deal with a Sketchy Email: A Simple Guide

Alright, folks! Let’s talk about those sneaky phishing emails. You know, the ones trying to trick you into doing something you’ll regret. But fear not, because I’ve got a step-by-step guide to help you tackle these cyber tricksters like a pro.

Getting the Suspicious Email

So, you get this email that seems a bit off. Maybe it’s claiming to be from your bank or a big-shot company. Time to put on your detective hat!

Breaking Down the Email Header

First stop, the email header. Now, you don’t need to be a tech wizard. Just look for something fishy. Use tools like mxtoolbox.com ,Phishtool to dig into the email’s origins — IP addresses, domains, the whole shebang.

Checking Out the Sender

Next up, the sender. Does the sender info match what they’re claiming? If the email screams “bank,” the sender’s domain better match the real deal.

Sniffing Out Anomalies

Now, let’s dive into the content. Look for weird stuff — generic greetings, odd requests, you name it. If it feels fishy, it probably is.

Inspecting Links and Attachments

Links are like traps, so be careful. Tools like Virus Total can help check if a link is playing nice or harboring some nasty surprises. Got an attachment? Pop it into a sandbox tool like urlscan.io— your virtual hazmat suit.

Calling in the Threat Intelligence Crew

Time to play detective. Consult threat intelligence feeds — it’s like having a cyber-Sherlock Holmes on speed dial. Cross-reference the sender’s details with known threats to see if they’re up to no good.

Checking Internal Logs

Now, peek into your organization’s internal logs. Any weird activities matching the email? Your SIEM system is your sidekick here.

What to Do If It’s a Phishing Expedition

Uh-oh, confirmed phishing! Activate the incident response plan. Isolate affected systems, kick out the cyber nasties, and reset those compromised credentials.

Keeping a Record

Don’t forget to take notes. Document your investigation — what you found, what you did about it, and how you saved the day.

Spreading the Word

Time to share the news. Report to your incident response team and management. Keep everyone in the loop on what went down.

Learning from the Experience

Phew, crisis averted! Now, review what went down. Any weak spots in your security game? Fix ’em up.

Remember, staying sharp and catching those phishing emails early is key to keeping your digital kingdom safe! 🕵️‍♂️🔒

Good Luck!

--

--