Customer Phishing Detection Playbook
Introduction: The Need for Effective Customer Phishing Detection Capabilities
Table of Contents
1. Initial Detection of Phishing Campaign
Query Option 1: Identify Suspicious Emails Targeting Customers
Query Option 2: Detect Malicious URL Activity
Query Option 3: Analyse Unusual Traffic from Customer Accounts
2. Compromised Customer Account Indicators
Query Option 1: Failed Login Attempts
Query Option 2: Unusual Login Patterns
Query Option 3: Email Forwarding or Auto-Reply Rules
3. Threat Delivery and Payload Analysis
Query Option 1: Malicious Attachments
Query Option 2: URL Redirect Chains
Query Option 3: Advanced Payload Execution Monitoring
4. Threat Persistence
Query Option 1: Monitoring for Persistent Phishing Rules
Query Option 2: OAuth Application Exploitation
Query Option 3: Indicators of Repeated Credential Abuse
5. Incident Response and Containment
Query Option 1: Isolate Affected Accounts and Devices
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
6. Conclusion
Last updated