EMAIL BETA - Potential evasion techniques detected in email

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2025-04-21
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

10 Minutes

Deduplication Period

1 Day

Required Data

  • Requires:

Detection Modules

Email

Detector Tags

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Masquerading (T1036)

Severity

Medium

Description

Multiple potential evasion techniques were observed in an email.

Attacker's Goals

Evasion techniques are used to avoid security scanners.

Investigative actions

  • Review the headers and content for patterns or anomalies.
  • Assess the email's context and attack techniques to determine the potential risk.
  • Review the email headers and metadata of each flagged email to identify potential spoofing techniques or unusual routing patterns.
  • Analyze any URLs or attachments in a secure sandbox environment to detect possible malware or phishing attempts.
  • Engage potentially affected users to understand if any actions were taken in response to these emails, which could increase the overall risk.
  • Document and escalate findings in case this is a broader phenomenon.

Variations

EMAIL BETA - Potential evasion techniques detected in email

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Masquerading (T1036)

Severity

High

Description

Multiple potential evasion techniques were observed in an email.

Attacker's Goals

Evasion techniques are used to avoid security scanners.

Investigative actions

  • Review the headers and content for patterns or anomalies.
  • Assess the email's context and attack techniques to determine the potential risk.
  • Review the email headers and metadata of each flagged email to identify potential spoofing techniques or unusual routing patterns.
  • Analyze any URLs or attachments in a secure sandbox environment to detect possible malware or phishing attempts.
  • Engage potentially affected users to understand if any actions were taken in response to these emails, which could increase the overall risk.
  • Document and escalate findings in case this is a broader phenomenon.