Phishing Analysis (GrabThePhisher - Cyberdefenders)


Scenario

As a cybersecurity analyst at an educational institution, you receive an alert about a phishing email targeting faculty members. The email appears to be from a trusted contact and claims a $625,000 purchase, providing a link to download an invoice.

Introduction

The “PhishStrike” scenario immerses you in a cybersecurity investigation where an educational institution is targeted with a phishing email. The attacker impersonates a trusted contact to bait faculty members into downloading a malicious file, purportedly an invoice for a $625,000 purchase. Leveraging tools such as Email Header Analyzer, URL Haus, and other threat intelligence platforms, this lab walks you through the analysis of email headers and URL-based malware to uncover Indicators of Compromise (IOCs). This exercise aims to deepen your understanding of phishing tactics, the use of SPF/DKIM for email validation, and effective threat mitigation strategies. 

Methodology (Steps I took)

Step 1: Identified the sender's IP address. 

Identifying the sender's IP address with specific SPF and DKIM values helps trace the source of the phishing email.