EOL Hunting: Phishing Campaign Detection
Detecting Phishing Campaigns in Exchange Online
Phishing campaigns are a prevalent attack method in Exchange Online environments. As a threat hunter, it’s essential to identify phishing emails and the indicators that suggest phishing activities within an organization.
Phishing Indicators to Look For:
Suspicious Links and Attachments: Phishing emails often contain malicious links or attachments designed to trick users into providing sensitive information or installing malware.
Spoofed Email Addresses: Attackers use domains or email addresses that closely resemble legitimate ones (e.g., "support@m1crosoft.com").
Urgency and Threatening Language: Phishing emails often create a sense of urgency (e.g., “Your account will be locked unless you update your credentials now”).
Hunting for Phishing Emails Using Message Trace:
Use Message Trace to follow the path of a phishing email through the organization.
Review the details of delivered messages, recipients, and whether any messages were quarantined or blocked.
Using Unified Audit Log for Phishing Detection:
Search the Unified Audit Log (UAL) for activities such as users clicking on suspicious links or opening phishing attachments.
Safe Links and Safe Attachments Insights:
Safe Links: Tracks and reports when users click on potentially dangerous links in emails. Use threat explorer to investigate clicks that led to malicious URLs.
Safe Attachments: Monitors and quarantines suspicious email attachments before they are delivered to users.
Threat Hunting Insight:
Phishing Campaign Spread: Use message trace and audit logs to track the extent of a phishing campaign within the organization, identifying which users have been targeted and whether any have clicked on phishing links.
Last updated