Social Engineering Detection Playbook
Introduction: The Need for Effective Social Engineering Detection Capabilities
Table of Contents
1. Initial Detection of Social Engineering Attempts
Query Option 1: Identify Suspicious Emails
Query Option 2: Detect Malicious URL Activity
Query Option 3: Unusual File Access Following Social Engineering Campaigns
2. Compromised Account Indicators
Query Option 1: Failed Login Attempts and Account Lockouts
Query Option 2: Logins from Unusual Locations
Query Option 3: Unusual Privilege Elevation Attempts
3. Payload Delivery and Execution
Query Option 1: Malicious Attachments Execution
Query Option 2: Command and Control Communication Detection
Query Option 3: Abnormal Process Execution
4. Threat Persistence Indicators
Query Option 1: Persistent Email Rules Creation
Query Option 2: OAuth Application Abuse
Query Option 3: Credential Reuse Patterns
5. Incident Response and Containment
Query Option 1: Isolate Affected Accounts and Devices
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
6. Conclusion
Last updated