Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
10 Minutes |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
An email potentially attempting to impersonate an internal employee, with financial or urgency context, was detected.
Attacker's Goals
Exploit trust relationships within the organization, to manipulate sensitive users into taking urgent actions, such as disclosing confidential information, transferring funds or clicking a malicious link.
Investigative actions
- Identify the specific emails responsible for the accumulation of these alerts.
- Review their headers and content for patterns or anomalies.
- Assess the email's context and attack techniques to determine the potential risk.
- Analyze any URLs or attachments in a secure sandbox environment to detect possible malware or phishing attempts.
- Engage potentially affected users to understand if any actions were taken in response to these emails, which could increase the overall risk.
- Document and escalate findings in case this is a broader phenomenon.