Phishing
Messages with links are nightmare. Make sure that no one clicked on link, submit credentials,... Try to convince victims - if they clicked - that nothing bad happen to them from management. Cooperation is a key.
In this case is crucial to get all evidence (e-mail with headers, not just body). From headers you can find who and how sended that phishing e-mail. Also there is a lot of other usefull information (DKIM, DMARC)
In case where one institution is targeted, make sure that you have access to mail server. Because you want to know who are other victims (if they are - on the other hand, this is spearphishing, someone really wants to get those credentials from one specific person).
tl;dr
Get the e-mail with headers
Who sended it? (IP, From, Reply-to, DKIM, DMARC and spam records)
Verify (on webserver) who also get this e-mail
One recipient > Spearphishing
Why is this person targeted?
More > Phishing
Check who got phished
Who (from recipients) clicked on link?
Who submit data (credentials, credit card data,...)?
Phished person have to change password(s) on all services even personal!
How does e-mail look like
Well prepared?
Simillar to service you are using?
Containing some internal information?
Logos?
Analyze site, where is phishing hosted
Hacked site, phishing in subdirectories?
Notify site owner
New, shiny site with certificate, tailored to your company?
Get certificate info from transparency list
Lessons learned
Educate users
Do not click & Report
Enhance detection methods
Check DKIM, DMARC setup
Only right SMTP(s) can send e-mail from your domain
This links to MITRE ATT&CK could be also usefull: Spearphishing Attachment, Spearphishing Link, Spearphishing via Service and User Execution
Last updated