what to do if you respond to a phishing email
ane. Activate IR procedures
ii. Obtain a copy of the electronic mail with total headers and any original attachments
iii. Mine the web for threat intelligence
iv. Talk to the clicker(s)
5. Adjust perimeter electronic mail filters to block similar messages
half-dozen. Start searching internal systems
7. Review proxy or outbound web logs
viii. Review postal service server logs
Check to see which users received the bulletin by searching your post server logs. If possible, search on the message ID, source IPs, From, Field of study, file zipper name, etc.
9. Review DNS logs
Logging DNS traffic is no longer hard. Enabling DNS logging in Demark is not hard either. When enabled, yous tin can import these logs into Splunk, then run queries on them to see which of your hosts did a lookup on any malicious domains yous find.
10. Ensure logs are retained
Nada stops an investigation common cold like a total lack of critical logs. Ensure that your DNS, DHCP, firewall, proxy, and other logs don't rotate off. Depending on how things go, you may need to save these logs and handle them in a way that will stand up up in court. Your IR program should address this.
11. Make an case out of it
Rahm Emanuel once said, "Yous never let a serious crisis go to waste. And what I mean by that, it'due south an opportunity to do things yous think you could not do earlier." Retrieve this quote the side by side fourth dimension y'all are dealing with a successful phishing attack, and utilise that outcome as an opportunity to raise security awareness amid management and your users.
In that location'south a reason, later on all, that high schools put wrecked cars out front of their buildings during prom flavour. It hits home because it'due south relatable; those who are forced to face up a possibility often can't help but recollect, "That could take been me!" But tread softly — you don't want users to feel that reporting something leads to professional embarrassment.
12. Make clean upward
Every bit a general rule of thumb, you'll need to alter the afflicted users' passwords — even if you are pretty sure that nothing serious happened. Why? Considering you'll never accept 100% assurance that the victims weren't completely compromised.
If a user's credentials (especially those used for remote access) are compromised, an attacker could come back and utilize legitimate access methods similar OWA or the VPN. After passwords accept been changed, review the activity of whatsoever impacted user business relationship for a menstruation of time pre- and post-incident.
xiii. Bank check for active sessions of affected users
A popular technique amid attackers is to leverage legitimate access methods like VPNs and Citrix to maintain a presence within the network and exfiltrate data. Following an attack, collect a list of the affected users and check to ensure that there aren't whatever current connections that shouldn't be active.
You practise have a listing of every remote access method, don't you?
14. Train your users to be "smart skeptics"
fourteen. Train your users to be "smart skeptics"
Become proactive! Have you lot e'er received an electronic mail and thought, "In that location'south something not quite correct with this…"? Those of us in the security space like to say we have "infosec spidey sense." Only we didn't get this overnight; it's a skill that nosotros've passively built up over time. Wouldn't information technology be dandy if instead of a Pavlovian response to click on anything in their inbox, your users paused for even 500 milliseconds and though, "Wait a sec…could this exist a PHISH?" Use phishing tests and security awareness grooming to your reward.
It can be done! Trust us, nosotros're professionals at this.
Notation: This commodity originated on the ThreatSim® web log. ThreatSim was acquired by Wombat Security in October 2015.
what to do if you respond to a phishing email
Source: https://www.proofpoint.com/us/security-awareness/post/14-things-do-after-phishing-attack
Posting Komentar untuk "what to do if you respond to a phishing email"