Skip to main content

Phishing Alerts Investigation

This Playbook is part of the PhishingAlerts Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Note: For the Phishing use case, see the Phishing Investigation - Generic v3 playbook.

This playbook investigates and remediates potential phishing incidents produced by either an email security gateway or a SIEM product. It retrieves original email files from the email security gateway or email service provider and generates a response based on the initial severity, hunting results, and the existence of similar phishing incidents in XSOAR.

No action is taken without an initial approval given by the analyst using the playbook inputs.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Search And Delete Emails - Generic v2
  • Phishing Alerts - Check Severity
  • Detonate File - Generic
  • Threat Hunting - Generic
  • Extract Indicators From File - Generic v2
  • Process Email - Generic v2
  • Email Headers Check - Generic
  • Block Indicators - Generic v2
  • Entity Enrichment - Phishing v2

Integrations#

This playbook does not use any integrations.

Scripts#

SearchIncidentsV2

Commands#

  • linkIncidents
  • closeInvestigation

Playbook Inputs#


NameDescriptionDefault ValueRequired
RoleThe default role to assign the incident to.AdministratorRequired
SearchAndDeleteWhether to enable the "Search and Delete" capability.
For a malicious email, the Search and Delete sub-playbook looks for other instances of the email and deletes them pending analyst approval.
TrueOptional
BlockIndicatorsWhether to enable the "Block Indicators" capability.
For a malicious email, the Block Indicators sub-playbook blocks all malicious indicators in the relevant integrations.
FalseOptional
AuthenticateEmailWhether the authenticity of the email should be verified using SPF, DKIM, and DMARC.TrueOptional
OnCallSet to True to assign only to analysts on the current shift. Requires Cortex XSOAR v5.5 or later.FalseOptional
SearchAndDeleteIntegrationDetermines which product and playbook is used to search and delete the phishing email from user inboxes.
  • Set this to "O365" to use the O365 - Security And Compliance - Search And Delete playbook.
  • Set this to "EWS" to use the Search And Delete Emails - EWS playbook.
EWSOptional
O365DeleteTypeThe method to delete emails using the O365 - Security And Compliance - Search And Delete playbook. Can be "Soft" (recoverable), or "Hard" (unrecoverable). Leave empty to decide manually for each email incident.
This is only applicable if the SearchAndDeleteIntegration input is set to O365.
SoftOptional
O365DeleteTargetThe exchange location. Determines from where to search and delete emails using O365 playbooks.
  • Use "All" to search all mailboxes
  • Use "SingleMailbox" to search and delete the email only from the recipient's inbox
  • Use "Manual" to decide manually for every incident.
Note: Searching all mailboxes may take a significant amount of time. This is only applicable if the SearchAndDeleteIntegration input is set to O365.
SingleMailboxOptional
SOCEmailAddressThe SOC email address to set if the playbook handles phishing alerts.Optional
closeIfBlockedWhether to close the investigation if the email has already been blocked.FalseOptional
escalationRoleThe role to assign the incident to if the incident severity is criticalOptional
blockedAlertActionValueA comma-separated list of optional values the email security device returns for blocked\denied\etc. emails.block, deny, denied, deleteOptional
SensitiveMailboxesListThe name of a list that contains the organization's sensitive users.Optional
SearchThisWeekWhether to search for similar emails in a week's time range or for all time.TrueOptional
CheckMicrosoftHeadersCheck Microsoft headers for BCL/PCL/SCL scores and set the "Severity" and "Email Classification" accordingly.TrueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Phishing Alerts Investigation