E-mail threats (3)
Spam Characteristics
Phishing Attack
email tailored to an org or group of individuals
- malicious payload (exe, office with macros, PDFs with Javascript, hyperlinks)
Spear Phishing Attack
Whaling attacks
form of spear phishing
Targets executives, senior mgmt
Email artifacts for threats
Email Analysis (within)
email header (proof of delivery, sender and return-path, servers/IP addresses)
body
attachments
Email Header correlations
Return-Path and From
X-Mailer with user and IP
Delivered-To and To (could be OK if BCC)
Email locations (5)
Mail server Journaling (if SOX compliant) Local containers within profiles temporary internet files temp directories contain attachments
Public IP and Emails
Yahoo appends public IP of sender to e-mails
Google does not.
Outlook Personal Folders (location)
C:\users\%username%\Local\Application Data\Microsoft\Outlook\
Thunderbird Mail (location)
%USERPROFILE%\Application Data\Thunderbird\Profiles\XXXXXXXX.default\Mail\
Windows.edb
C:\ProgramData\Microsoft\Search\Data\Application\Windows
-Windows indexer for searching