Spoof Campaign??? 😔

Posted by NotABoyAnAbomimation@reddit | sysadmin | View on Reddit | 16 comments

Spent this entire week explaining to clients that there is apparently an international conflict going on and that is why they are getting spoofed emails from themselves or there’s just some kinda new AI dark web spoofing tool (rough ideas but clients seem to react well to it lol)

+++++++

At this point I need to know if my checklist is sane or if I am missing anything obvious:

Check where the spoofed email landed

Inbox = bad

Quarantine = less bad

Check the domain auth immediately

I start with SPF, DKIM, and DMARC.

MXToolbox is the quick check, then I verify the real DNS records.

If DMARC is missing or weak, that is usually the first red flag.

End goal is p=reject, obviously only once the domain is actually ready for it.

Check Microsoft 365 protections

If the client is paying for Defender for Office 365, I am looking at impersonation protection, domain impersonation, anti-phishing policies, etc.

A lot of tenants have the licensing but nobody actually configured the protections.

Confirm whether it is true spoofing or something worse

I do not want to tell a client ā€œjust spoofingā€ if the account is actually compromised, forwarding rules got abused, or something internal relayed it.

Headers and trace first, assumptions later.

Third-party filtering if needed

Ironscales / Mimecast type stuff if native filtering is not cutting it.

Not my first fix, but sometimes needed.

Let me know if I’m missing something obvious. I’m just a stressed out lvl 2 escalations.

Thanks