STOP
PHISHING
Handbook
STOP
PHISHING
Intro
Guess what? Some clever clogs have been trying to play dress-up, sending
emails from your company to obtain information about Lupovis.
These are sneaky little phishing attempts trying to snag our personal details.
But, we'got your back!
We've got our Sherlock Holmes hat on and we're hunting down these naughty
impersonators. Meanwhile, we'd love to share how you can step up your game to
stop these fishy emails from swimming out again.
The easy steps
So, we'd love to help you, and we made a quick guide for you.
Password Changes: If the account appears to have been compromised,
01 immediate password changes should be enforced.
02 Check Forwarding: Adversaries often use forwarding functions, just in case you
change your password. Make sure that all email forwarding are disabled.
Employ Multi-factor Authentication (MFA): Enable MFA for all email accounts
03 makes it more difficult for attackers to gain access to email accounts, even if
they manage to acquire the passwords.
02
STOP
PHISHING
The Intermediary
Email System Investigation: Review the organization's sent folder and mail
01 server logs for any unusual emails that might have been sent out to clients.
02 Investigate Unusual Logins: Check the account for any unusual logins or activity.
This includes checking for logins from unfamiliar locations or at odd hours.
Audit User Account Access: Review who has access to the email system and
03 whether their access level is appropriate. Any unnecessary access should be
immediately revoked.
04 Check for Malware: Perform a malware scan on the system to ensure there's no
malicious software causing these emails to be sent.
The harder ones
01 Enable DKIM: DomainKeys Identified Mail (DKIM) is an email authentication
method that is designed to detect forged sender addresses in emails, a
technique often used in phishing and email spam. It allows the receiving mail
server to check if the email was actually sent by the domain it claims to have
been sent from and if the content was tampered with during transit.
Enable DMARC: Domain-based Message Authentication, Reporting &
02 Conformance (DMARC) is another protocol that uses both SPF and DKIM to
determine the authenticity of an email message.
Finally, if you're feeling a bit lost at sea with all this talk of phishing and email
security, remember we're here to throw you a lifebuoy!
Don't hesitate to reach out to us with any questions or concerns you
may have. If you're more comfortable speaking with someone local to
you, that's great too! Consider contacting a cybersecurity firm in
your area who can provide a helping hand. After all, navigating the
stormy waters of cybersecurity can be a team effort!
03
GOOD
LUCK
[Link]