Phishing Email Analysis
Types of Malicious Emails
Spam: unsolicited junk emails sent out in bulk to a large number of recipients. The more malicious variant of Spam is known as MalSpam.
Phishing: emails sent to a target(s) purporting to be from a trusted entity to lure individuals into providing sensitive information.
Spear phishing: takes phishing a step further by targeting a specific individual(s) or organization seeking sensitive information.
Whaling: is similar to spear phishing, but it's targeted specifically to C-Level high-position individuals (CEO, CFO, etc.), and the objective is the same.
Smishing: takes phishing to mobile devices by targeting mobile users with specially crafted text messages.
Vishing: is similar to smishing, but instead of using text messages for the social engineering attack, the attacks are based on voice calls.
Quishing: Also known as QR Code Phishing, uses QR codes to lure unsuspecting users to scan the QR code and redirect them to a phishing website.
Characteristics of Phishing Emails
The sender email name/address will masquerade as a trusted entity (email spoofing).
The email subject line and/or body (text) is written with a sense of urgency or uses certain keywords such as Invoice, Suspended, etc.
The email body (HTML) is designed to match a trusting entity such as Banking/e-commerce websites.
The email body (HTML) is poorly formatted or written (contrary from the previous point).
The email body uses generic content, such as Dear Sir/Madam.
The email body only shows an image, hyperlink, or QR code without any further context or information.
Hyperlinks (oftentimes uses URL shortening services to hide its true origin).
A malicious attachment posing as a legitimate document.
Email Header Analysis
Email Body Analysis
Additional Phishing Techniques
Cloud Storage Services
Attackers may use cloud storage services such as Google Drive, OneDrive, SharePoint, Dropbox, etc. to store their payloads. This is to trick users into clicking on Google Drive or OneDrive links as those appear harmless and came from a legitimate entity (Google, Microsoft) to trick users into downloading malicious files.
Subdomains and Pages
Attackers try to deceive users, security products, and analysts by creating a free subdomain or pages from services from Microsoft, WordPress, Blogspot, Wix, Google pages, etc. Since Whois information cannot be searched as a subdomain, analysts can be tricked that these addresses have been taken in the past and belong to legitimate organizations such as Microsoft, WordPress, Google, etc.
Form Applications
Various platforms allow for form creation, which attackers use instead of developing their own phishing sites. The domain is normally harmless, thus it can be sent to the user without triggering security scanners. A popular service is Google Forms. As the Whois information shows that it is from a legitimate entity, the attacker can mislead analysts, which is why it is important to perform dynamic analysis of these kinds of links as well.
Tools
Email Header Analyzer Tools
MXToolbox: https://mxtoolbox.com/EmailHeaders.aspx
URL Defang Tools
Defang Tool: https://defa.ng/
CyberChef Defang URL:https://gchq.github.io/CyberChef/#recipe=Defang_URL(true,true,true,'Valid domains and full URLs')
SPF/DKIM/DMARC Lookup Tools
EasyDMARC: https://easydmarc.com/tools
MXToolbox: https://mxtoolbox.com/SuperTool.aspx#
DMARCIAN Domain Checker: https://dmarcian.com/domain-checker/
IP Information Lookup Tools
IPinfo: https://ipinfo.io/
IPLocation.io: https://iplocation.io/
Reverse IP Lookup Tools
DNSChecker Reverse IP Lookup: https://dnschecker.org/reverse-dns.php
MXToolbox: https://mxtoolbox.com/ReverseLookup.aspx
Whois Lookup Tools
Whois: https://www.whois.com/whois/
ICANN Lookup: https://lookup.icann.org/en
DomainTools: https://whois.domaintools.com/
URL Extractor Tools
ConverCSV URL Extractor: https://www.convertcsv.com/url-extractor.htm
Browserling URL Extractor: https://www.browserling.com/tools/extract-urls
MiniWebtool URL Extractor: https://miniwebtool.com/url-extractor/
QR Code Scanner Tools
ScanQR: https://scanqr.org/
QR Code Scanner: https://www.imagetotext.info/qr-code-scanner
IP/Domain Reputation Tools
AbuseIPDB: https://www.abuseipdb.com/
Cisco Talos Intelligence: https://www.talosintelligence.com/reputation_center
Spamhaus: https://www.spamhaus.org/ip-reputation/
VirusTotal: https://www.virustotal.com/gui/home/upload
URLScan.io: https://urlscan.io/
Islegitsite: https://www.islegitsite.com/
File Reputation Lookup Tools
Cisco Talos Intelligence: https://talosintelligence.com/talos_file_reputation
VirusTotal: https://www.virustotal.com/gui/home/upload
Virtual Browsers
Browserling: https://www.browserling.com/
Wannabrowser: https://www.wannabrowser.net/
Kasm Workspaces: https://www.kasmweb.com/
Rammerhead Browser: https://browser.rammerhead.org/
Online Sandbox
Joe Sandbox: https://www.joesandbox.com/#windows
AnyRun: https://any.run/
HybridAnalysis: https://www.hybrid-analysis.com/submissions/sandbox/urls
VirusTotal: https://www.virustotal.com/gui/home/upload
Phishing Detection and Analysis Tools
PhishTool: https://www.phishtool.com/
OpenPhish: https://phish.report/contacts/OpenPhish
PhishTank: https://phishtank.org/
DNSTwist: https://dnstwist.it/
URLScan.io: https://urlscan.io/
Other Resources
Last updated