Skip to main content
T1566Initial Accesseasy difficulty

Phishing

Phishing (T1566) is a MITRE ATT&CK technique in the Initial Access tactic. SOC analysts detect it by monitoring for SIEM, Firewall events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

SIEMFirewall

What is Phishing?

Phishing is a social engineering technique where adversaries send fraudulent electronic messages to gain access to victim systems or credentials. Attackers craft convincing emails, text messages, or other digital communications that appear to originate from trusted sources such as financial institutions, colleagues, or well-known services. The malicious content typically contains links to credential harvesting sites, attachments containing malware, or requests for sensitive information. Spearphishing targets specific individuals using personalized content gathered through open-source intelligence, making detection significantly harder. Organizations face phishing attacks that range from mass commodity campaigns to highly targeted operations conducted by nation-state actors. Successful phishing can lead to credential theft, malware installation, or direct unauthorized access to corporate systems, making it one of the most prevalent initial access vectors observed in real-world intrusions.

Phishing is documented as technique T1566 in the MITRE ATT&CK knowledge base under the Initial Access tactic. Detection requires visibility into SIEM, Firewall telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Phishing activity. These methods apply across SIEM, Firewall environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor email gateway logs for messages with mismatched sender display names and actual email addresses, paying particular attention to domain typosquatting patterns such as substituting similar-looking characters.

  2. 2

    Analyze URL click patterns in email security tools and proxy logs for newly registered domains, domains with low reputation scores, or domains that redirect through multiple hops before reaching a final destination.

  3. 3

    Inspect email attachments for macro-enabled Office documents, password-protected archives, and double-extension files that are commonly used to bypass basic file type filters in email security gateways.

  4. 4

    Correlate user authentication events with phishing simulation data and email delivery timestamps to identify accounts that may have submitted credentials to harvesting pages shortly after receiving suspicious messages.

  5. 5

    Deploy honeypot email addresses in the corporate directory and alert on any messages delivered to those addresses, which provides high-fidelity signals of active phishing campaigns targeting the organization.

  6. 6

    Review DNS query logs for domains queried immediately after suspicious email delivery, focusing on domains registered within the past 30 days or those using dynamic DNS providers frequently abused by threat actors.

Example Alerts

These realistic alert examples show what Phishing looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighSIEM

Suspicious Email Link Click - Credential Harvesting Site

User jsmith@corp.com clicked a URL in an email that redirected through three domains before landing on a page mimicking the corporate Office 365 login portal. The final destination domain was registered 2 days ago and has no prior reputation history in threat intelligence feeds.

CriticalXDR

Malicious Macro Document Execution Detected

Microsoft Word process spawned PowerShell with encoded command line arguments after user opened an attachment from an external email. The parent-child process relationship and Base64-encoded payload are consistent with macro-based malware delivery observed in multiple threat actor campaigns.

MediumFirewall

Email with Suspicious Attachment Blocked

Email security gateway blocked an inbound message containing a ZIP archive with a double-extension file named invoice_2024.pdf.exe. The sending IP address appears on three commercial threat intelligence blocklists and has been associated with phishing infrastructure for the past six months.

Practice Detecting Phishing

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Phishing. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Phishing?
SOC analysts detect Phishing (T1566) by monitoring SIEM, Firewall telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor email gateway logs for messages with mismatched sender display names and actual email addresses, paying particular attention to domain typosqu. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Phishing?
Phishing can be detected using SIEM, Firewall platforms. SIEM tools are particularly effective for this technique because they provide visibility into the initial access phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Phishing in real-world attacks?
Phishing is a well-documented MITRE ATT&CK technique in the Initial Access tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Phishing scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Phishing for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Initial Access techniques like Phishing. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Phishing? — SOC Glossary

Phishing is a social engineering attack delivered via email, SMS, voice calls, or other channels that deceives recipient…

Read more
Glossary

What is Attack Surface? — SOC Glossary

An organization's attack surface is the total set of points where an adversary could attempt unauthorized access: networ…

Read more
Glossary

What is Social Engineering? — SOC Glossary

Social engineering is the psychological manipulation of individuals into performing actions or revealing information tha…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Career Path

SOC Analyst (Tier 1) Career Guide — Salary & Skills

Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Tool

Firewall Training Console — SOCSimulator

The Firewall console in SOCSimulator replicates the log analysis experience of enterprise platforms like Palo Alto Netwo…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more
Playbook

Business Email Compromise (BEC) Investigation — Investigation Playbook

When financial staff receive urgent payment requests from executives or vendors, or when email rules are discovered forw…

Read more

We use cookies to improve your experience and measure usage. Learn more