What are common attack vectors for phishing?
phone call, text message, email
What is the easiest way to find the original sender of an email?
by looking for the X-Originating-IP header
What exactly is the IP address found in the X-Originating-IP header?
IP address of the client machine, not IP address ofthe forwarding SMTP server
remember that the header can be easily spoofed
How can you read all the elements of the email even though some parts of it were blocked/removed by an email security apppliance?
by inspecting the HTML code of the email
What is malspam?
malicious form of spam
What is whaling?
similar to spear phishing, but it’s targeted specifically to C-Level high-position individuals (CEO, CFO, etc.), and the objective is the same
What is smishing?
phishing to mobile devices by targeting mobile users with specially crafted text messages
What is vishing?
similar to smishing, but instead of using text messages for the social engineering attack, the attacks are based on voice calls
What are typical characteristics phishing emails have in common?
What is defanging?
hxxp[://]www[.]suspiciousdomain[.]comWhat is BEC (Business Email Compromise)?
when an adversary gains control of an internal employee’s account and then uses the compromised email account to convince other internal employees to perform unauthorized or fraudulent actions
What are web beacons?
tracking pixels
What is the purpose of web beacons used by phishers?
What are the 3 common tools that are used to analyze email headers?
https://toolbox.googleapps.comhttps://mha.azurewebsites.nethttps://mailheader.orgWhat information should an analyst collect from an email header?
What are the artifacts that an analyst needs to collect from the email body?