12 Email Investigation
12 Email Investigation
Midhun Mohan M G
Agenda
» Why focus on email investigation?
» All you need to know about email systems.
⁻ Email Workflow
⁻ Email Headers
⁻ Email Authentication
⁻ Email Spoofing
» Email Threats - Examples
» Email Investigation
92% of malware are delivered by email 48% of malicious attachments are office docs
Breach Investigation report 2018, Verizon ISTR report 2019, Symantec
56% companies consider targeted phishing as 83% of organizations have been victim of
their top security concern spear phishing attacks in the last 1 year
Global Threat Landscape report 2019, CyberArk State of Phish 2019, Proofpoint
32% of data breaches involved phishing Employees in small organizations are more
Data Breach Investigation Report, Verizon likely to be hit by email threats
ISTR report 2019, Symantec
Syntax
Received: from sending.mx (IPv4/6) by receiving.mx (IPv4/6) with protocol id; timestamp
DNS server3
MUA
alice@outlook.com
2
▪ SPF record published with DNS records. ▪ Uses public and private keys to ▪ DMARC also requires a DNS record
▪ Allows senders to define which IP cryptographically authenticate emails v=DMARC1; p=none; fo=1; ri=3600;
addresses are allowed to send mail for a rua=mailto:XXXX@rua.agari.com;
▪ Private key of the domain is used to ruf=mailto:XXXX@ruf.agari.com
particular domain. digitally sign every email from a domain
v=spf1 ip4:64.34.187.182 ip4:66.70.82.40
▪ ‘p’ defines the action to be taken by the
ip4:64.27.72.0/24 include:magnetmail.net ~all ▪ Recipient mail server validates DKIM recipient
signature with the domain’s public key p=none (no action / monitoring)
▪ The recipient mail server validates SPF p=quarantine
p=reject
⁻ No sender SPF – SoftFail
⁻ SPF published but no match – Hard Fail
- Spoofed Email
- BEC / Wire Fraud
- Phishing Email
- Malicious Email
- Spoofed Email
- Phishing is the fraudulent attempt to obtain
- BEC / Wire Fraud sensitive information or data.
- Phishing Email - Phishing attack uses disguised email as a weapon.
- Phishing with Url.
- Malicious Email - Phishing with attachment.
- Vishing vs Smishing
• Focus is on finding the root cause and • Focus on collecting and preserving
remediation evidence for litigation
• Follows PICERL process • Quick resolution / remediation is not a
1.
2.
Preparation
Identification
vs priority
• Longer duration of cases
3. Containment
4. Eradication
5. Remediation
6. Lessons Learned
Where was
IP address / Mail server
it sent ISP
Geolocation
domain
Message-ID
from?
Is there
Message Calendar
relevant body
Attachments URL
entries
content?
08 March 2021 Email Investigation 20
Incident Response life cycle
Preparation Identification Containment Eradication Remediation Lessons Learned
Gateway / cloud email scan Improve logging
Architecture Block email traffic Purge Reset credentials
logs
Contacts Mailbox audit logs Block network traffic Remove backdoors Patch vulnerabilities New security tech required
Logs / SIEM Web traffic logs Isolate network Reimage systems Deploy backup Documentation
Preservation Interpretation
getmg120@gmail.com
https://www.linkedin.com/in/midhunmg
+91 9995393431