Phishing Email Compromise Detection Playbook
Introduction: The Need for Effective Phishing Email Compromise Detection Capabilities
Table of Contents
1. Initial Detection of Phishing Activity
Query Option 1: Identify Suspicious Emails
Query Option 2: Detect Unusual URL Clicks
Query Option 3: Advanced Network Traffic Analysis
2. Compromised Account Indicators
Query Option 1: Multiple Login Failures
Query Option 2: Logins from Unusual Locations
Query Option 3: Suspicious Email Forwarding Rules
3. Malicious Payload Delivery
Query Option 1: Identify Malicious Attachments
Query Option 2: Detect Command Execution from Email Clients
Query Option 3: Advanced Process Analysis
4. Threat Persistence
Query Option 1: Unauthorized OAuth Application Approvals
Query Option 2: Persistent Email Rules
Query Option 3: Advanced Token Abuse Indicators
5. Incident Response and Containment
Query Option 1: Isolate Compromised Accounts
Query Option 2: Identify Indicators of Compromise (IoCs)
Query Option 3: Incident Timeline Reconstruction
6. Conclusion
Last updated