Scam Detection Playbook
Introduction: The Need for Effective Scam Email Detection Capabilities
Table of Contents
1. Initial Detection of Scam Activity
Query Option 1: Identify Scam Emails
Query Option 2: Detect Unusual Click Activity on Scam URLs
Query Option 3: Monitor Unusual Outbound Network Traffic
2. Compromised Account Indicators
Query Option 1: Login from Unusual Locations
Query Option 2: Suspicious Email Rule Creation
Query Option 3: Abnormal Authentication Patterns
3. Financial and Data Theft Indicators
Query Option 1: Monitor Unusual File Access
Query Option 2: Detect Outbound Data Transfers
Query Option 3: Identify Use of Financial Manipulation Tools
4. Threat Persistence
Query Option 1: Persistent Email Rules
Query Option 2: OAuth Application Abuse
Query Option 3: Advanced Indicators of Credential Abuse
5. Incident Response and Containment
Query Option 1: Isolate Compromised Accounts and Systems
Query Option 2: Identify Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
6. Conclusion
Last updated