Activity) Report Writing Answers Flashcards
Report Writing Exercise
Below is the report that we would’ve written given the information included in the investigating analyst’s notes. Please note that the required content of phishing reports will vary with different organizations, but the below encompasses all of the information in a format that could be used anywhere. Compare your report to the one below to see how similar they are. People will write their reports differently, so provided you have included all the reports from the investigating analyst’s notes, then you’ve done well!
Challenge Answers
Email Description and Artefacts Collected
Sending Address: emailsecalert1@gmail.com
Subject Line: Your Email Will be Locked! Act NOW!
Recipients:
john.smith@dicksonunited.co.uk
alice.cooper@dicksonunited.co.uk
jacon.long@dicksonunited.co.uk
fred.johnson@dicksonunited.co.uk
pickle.rick@dicksonunited.co.uk
Sending Server IP: 209.85.222.173
Reverse DNS: mail-qk1-f173.google.com (Gmail)
Reply-To: emailsecalert1@gmail.com
Date and Time: 3:21 PM Monday 1st June 2020
Full URL (sanitized): hxxps://outlook-security.emailsecalerts[.]net/index/2020/OWA.php?
Root Domain: hxxps://emailsecalerts[.]net
Looking at the reported email in the Outlook email client, this message is impersonating an Outlook security alert using branding such as Outlook logos. The email is informing recipients that their mailboxes will be closed unless they confirm their identity, where they are directed to click on a button, likely leading to a credential harvester based on the context of the email.
Artifact Analysis
Checking the email gateway shows that there have been no outgoing emails to the sending address, therefore no recipients have replied to the sender.
A reverse DNS search on the sending server IP shows that this email has definitely originated from Gmail, and not Microsoft.
URL2PNG analysis shows that the full URL is an Outlook credential harvester, asking users to enter their email and password.
A VirusTotal search for the domain shows that it has been flagged for malicious and phishing activity, therefore it is known to be malicious within the security community.
Checking the SIEM and EDR no employees have made a network connection to the malicious domain, so no recipients have clicked on the link in the email at this time.
The domain is also attempting to typo squat or appear as a legitimate domain related to email security alerts, trying to make the attack more believable to targets.
Suggested Defensive Measures
As the sender is using a Gmail address, the most appropriate action would be to block this specific mailbox to prevent any more incoming malicious emails from this sender.
Requesting an email gateway block for the sending address “emailsecalert1@gmail.com“.
The domain has been recognized as malicious, and there is no business justification for any employees needing to access this site. As it has a malicious reputation on VirusTotal, and analysis has shown that it is hosting a credential harvester, the entire domain can be blocked on the web proxy, preventing employees from connecting to the site. This will also make future phishing attacks using this same domain ineffective.
Requesting a web proxy block for the domain “hxxps://emailsecalerts[.]net“.