Posts

[THM] Phishing Emails 2 by TryHackMe

Image
We Meet Again This module is all about getting into the actual phishing email header analysis. The biggest suggestion I have here is to get and stay curious about the oddities coming into your mailbox. Do header analysis on all those weird enhancement emails and pay close attention in the next upcoming module on how to handle potential malicious payloads so you learn the best way to open attachments and links.  But let's dig into this module first.

[THM] Phishing Emails 1 by TryHackMe

Image
Kicking Off I was really excited to see this module come through on  TryHackMe  as my early work surrounded email security and I had to largely self teach. I am hoping that I can add in my thoughts from doing BEC  investigations over the past few years so that some more context is given to how much damage is done via email year over year.  As the first module notes, spam and phishing are common in the world of social engineering . Commonly, the threat actors that compromise email accounts are looking to divert funds in some way, utilizing further social engineering skills along with technical skills like spoofing to steal money.  If it isn't loss of funds, compromised accounts are commonly used to launch spam campaigns   (I love the link here from mail chimp because it tells us and threat actors how to bypass mail filters),  credential harvesting or Malspam,  so that the threat actor can pivot into another account. Often, we see these compro...