Day 20 – Email Security & Phishing Detection (Core SOC Skill)

Phishing is the #1 attack vector in the world.
More than 90% of breaches start with phishing emails.

Today your students learn:

✔ How phishing works
✔ How to analyze suspicious emails
✔ What SOC should check in email logs
✔ How to detect malicious URLs
✔ How to investigate attachments
✔ MITRE mapping


🧠 1. What Is Phishing? (Easy Explanation)

Phishing = attacker sends fake emails to trick users into:

  • Clicking malicious links
  • Downloading malware
  • Entering passwords
  • Giving access

Simple examples:

  • Fake Office 365 login
  • Fake bank message
  • Fake invoice
  • Fake PDF attachments

📨 2. Types of Phishing Attacks

✔ 1. Regular Phishing

Mass emails → “Reset your password”, “Delivery failed”, etc.

✔ 2. Spear-Phishing

Targeted to one person (CEO, HR, Finance).

✔ 3. Whaling

Targeting top executives.

✔ 4. Clone Phishing

Copying real emails and replacing the link.

✔ 5. Business Email Compromise (BEC)

Attacker pretends to be CEO/manager and asks for money transfer.


🔍 3. Email Components SOC Analysts Must Check

1️⃣ From Address

Is it spoofed? e.g.
support@microsofft.com

2️⃣ Display Name vs Real Email

“Microsoft Support” random@gmail.com

3️⃣ Subject Line

Urgency, fear, “action required”.

4️⃣ Links Inside Email (Very Important)

Hover link →

  • Fake domain
  • Similar domain
  • Redirect link

5️⃣ Attachments

Examples:

  • invoice.pdf.exe
  • payment.docm (with macros)
  • resume.xlsm

6️⃣ Headers (Advanced)

Check:

  • Return-Path
  • SPF pass/fail
  • DKIM signature
  • DMARC results

🔥 4. Phishing Detection in Splunk (Very Easy)

Email logs from O365, Google Workspace, Exchange, Proofpoint, Mimecast etc.

Search for suspicious links

index=email "http" OR "https"

Search for blocked/malicious URLs

index=email verdict=malicious

Search for suspicious attachments

index=email attachment="*.exe" OR "*.js" OR "*.vbs" OR "*.scr"

Search for failed SPF/DKIM

index=email spf=fail OR dkim=fail OR dmarc=fail

Search for external → internal attacker

index=email sender_domain!=company.com


🧩 5. MITRE Mapping for Phishing

MITRE TechniqueDescription
T1566Phishing
T1566.001Spear-phishing (Attachment)
T1566.002Spear-phishing (Link)
T1204User Execution
T1059Malware execution after attachment download

🧪 6. Day 20 Hands-On Tasks

Task 1 – Identify phishing email subjects

index=email subject="*" 
| search ("login" OR "verify" OR "password" OR "urgent")


Task 2 – Detect fake sender address

index=email sender_domain!="company.com"


Task 3 – Detect malicious attachments

index=email attachment="*.zip" OR "*.exe" OR "*.js"


Task 4 – Detect failed SPF/DKIM

index=email spf=fail OR dkim=fail OR dmarc=fail


Task 5 – Analyze a real suspicious URL

Students must:

  1. Copy URL
  2. Check with VirusTotal
  3. Check with URLScan
  4. Check the domain age (whois)

🎤 Trainer Script

Say this during class:

“Phishing is the biggest threat for any company.
If SOC detects phishing early, you prevent ransomware, malware, and credential theft.
Email security is your first line of defense.”


📝 Homework (Day 20)

Students must submit:

  1. One suspicious email subject
  2. One suspicious sender address
  3. One suspicious URL
  4. A Splunk search detecting phishing
  5. MITRE mapping

Leave a comment

Previous Post

Recent posts

Quote of the week

in learning you will teach and in teaching you will learn

~ Phil Collins
Design a site like this with WordPress.com
Get started