<aside> 🚨
This process ensures IT can handle phishing reports effectively while leveraging expert cybersecurity support from Kmicro SOC.
</aside>
When the IT Dept receives a phishing report, they should follow these steps to triage and escalate effectively:
1. Acknowledge Receipt
• Send a quick acknowledgment to the reporting staff member to confirm their email was received (e.g., “Thank you for reporting this. We are reviewing the issue.”).
<aside> ⏩
Forward the email to [email protected] if a ticket has not already been created, to ensure proper documentation.
</aside>
2. Perform Basic Checks
• Examine the Email Headers:
• Verify the sender’s IP address and domain.
• Look for spoofing signs or mismatched domains.
• Check Links or Attachments (Safely):
• DO NOT click links or open attachments directly.
• Use a secure sandbox or tools like VirusTotal to scan URLs or attachments.
• Identify Patterns:
• Determine if this email is part of a larger phishing campaign targeting other users in the organization.
3. Search for Impact Across the Organization
• Use your email gateway logs to identify if other staff members have received the same email.
• Check for any reports of unusual activity in related accounts (e.g., failed logins, suspicious access).
4. Forward to Cybersecurity Experts
• After completing the above checks, escalate to your cybersecurity team at [email protected].
• Attach the original email (use “Forward as Attachment” to preserve metadata).
• Include a summary of your findings:
• Sender’s email address and domain.
• Suspicious links or attachments.
• Whether other employees received similar emails.
• Any potential indicators of compromise (IOC).
5. Contain and Mitigate
While waiting for SOC feedback, take proactive steps to minimize risk:
• Block the Sender’s Email Address:
• Use the email security platform to blacklist the sender or domain.
• Warn Staff (If Necessary):
• Send an advisory to staff if the phishing campaign appears widespread (e.g., “Do not open emails with the subject line ‘Urgent Invoice.’”).
• Monitor Systems for Unusual Activity:
• Keep an eye on logs for suspicious login attempts or data transfer.
6. Follow SOC Guidance
Once SOC responds:
• Implement their recommendations, such as blocking domains, resetting credentials, or initiating further incident response steps.
• Update internal documentation with any newly identified IOCs or preventive measures.
7. Log and Close the Ticket
• Document the incident in your ticketing system, including:
• Details of the phishing attempt.
• Steps taken by IT and SOC.
• Any follow-up actions required.
• Notify the reporting staff member that the issue has been addressed.