Phishing
Phishing
Phishing
Topics
The information is then used to access important accounts and can result in
identity theft and financial loss.
Examples of phishing
Phishing involves fraudulently acquiring sensitive information (e.g.,
passwords, credit cards) by masquerading as a trusted entity.
SPEAR-PHISHING
Email Filtering
Email monitoring tools
Communication
Training and awareness to employees
Acceptable usage policy
Local archive or backups
Email logs analysis tools
Detection and Containment of Email
Security Incidents
Inability to access the system or the email accounts after opening an email.
Email format IDs that don't have incomplete or incorrect organization name or
use numbers in the place of letters in the name.
Emails with links, which display a different website or URL when hovered on
or have URL with incorrect name or domain
Emails presenting offers that are too attractive to believe, such as winning
the lottery, a competition, a free subscription, vacation, and job offers.
• Phishtank is a collaborative
clearing house for data and
information about phishing on the
internet.
• It provides an open API for
developers and researchers to
integrate antiphishing data into
their application.
Isolate the targeted system from the functional network immediately after
receiving the incident report.
Interview the users or compliment about the email incident to find details of
the attack and user actions.
Ask if the user had downloaded the attachment, clicked the link, provided
the requested information, and so on.
Containing Email Incidents
If the email consist of links, find further details of the link by opening it in a
sand box environment to perform behavior analysis.
Report and block the malicious links in the server, network devices, and
across all security solutions.
Preventing spam
The appearance of the email header differs between ESPs. To analyze it,
you need to find the email header and examine the lines of interest to you.
All the code from the beginning, until the <body> tag, represents the
header.
Analyzing an Email Header
return path
Recipient's email address
Name of the email server
Type of email sending server
IP address of sending server
Unique message number
Date and time of email was sent
Attachment file information
Sender Policy Framework (SPF)
Domain Key Identified Mail (DKIM)
Example of Email Header Analysis
Sender Policy Framework (SPF)
MxToolbox
Collect details of an email security incident such as URL, subject, links, sender,
and IP address, from email header analysis and block them across servers,
security tools and network devices we can seek help from ISPs to help us
performing these actions.
Immediately alert employees about the incident and train them to diagnose it,
inform Network administrators to guide employees who to deal with the current
situation.
Update antiphishing and antispam tools with the newly found signature and
details of the attack to prevent similar attacks in the future.
Find common pattern and signatures from the email to block them on the SMTP
server.
Eradicating Email Attacks
Check the SMTP logs to find if the same email is sent to other employees
and remove them from the inboxes.
Check if other users have been impacted with the attack and perform
incident handling process on their system as well.
Use DNS blocking to block IP addresses used to send the malicious emails.
Train the employees to check email headers from the email asking for
immediate action such as financial transactions.
Blacklist the malicious websites and disable automatic download across all
the systems and devices.
Ensure removal of malware related data from affected systems such as text
files, process executed by the malware.
Block and remove the impacted accounts and re-issue new accounts to
the employees.
Eradicating Email Attacks
Install browser extensions and tools that help in detecting and preventing
phishing and spam emails.
Never give your email ID in clickable form on the web to prevent spam bots
from stealing your email ID.
Maintain a personal email ID which is shared only with friends and family
members and never use that email ID for any other purpose.
Do not enter personal details in suspicious links sent in email form and pop-
up screen.
Beware of the too good to be true or over attractive schemes and offers.
Guidelines Against Phishing
Never open the email marked as spam even if the subject line seems to be
interesting, and delete such email immediately.
Inform banks and financial institutions about the attack and block the
compromised accounts.
Gmail :
1. Log in to Gmail
1. In the left pan, scroll down and find the trash folder
2. Click the trash folder and you can view the list of all deleted emails in the
right pane of the window
Recovery of Deleted Emails
Outlook :
1. Login to MS outlook
2. The folder will contain recently deleted items
3. In the home tab click recover deleted items from server
4. Click on the email you want recover and select restore selected items
button
5. Then click OK button
6. Now, navigate back to the deleted item folder ; you can find the
recovered emails
Email Security Checklists