How to Respond to
a Phishing Attack?
What to do right after your end-users got hit with phishing:
`` Block the phishing URL on Firewalls, AV endpoints
`` Block the sender’s email
`` Conduct an email compliance search to return lists of users who opened/received
the email
`` Purge the malicious email from all email inboxes
`` Reset affected users’ passwords and log them out of active sessions (based on the
report from step 3):
`` If a small subset of users is affected:
`` Reach out to affected users by phone to reset password
`` If users reach out first, confirm identity by calling the user back using the
phone number on record
`` If the affected pool is larger:
`` Reset affected users’ passwords using the “change on login” option and export
the list of generated passwords. Notify a supervisor by phone with a list of affected
users and generated passwords, and by message prompt on computers
`` Run a search for inbox rules and forwarding rules and delete suspicious rules:
`` Rules that forward the email to external domains
`` Rules that move, delete or block messages
`` Check the creation date and rule description that matches suspicious actions
(these will usually have similar names as the inbox rules); it should be easy to
determine that it was created by a bot and not by a human
`` Run a search for mail sent out from possibly hacked accounts:
`` Instruct affected users to reach out to clients by email and phone alerting them of
malicious emails that may have been sent out from their accounts
`` Turn on MFA for compromised accounts and provide a guide to users to get them
properly set up
For more details on each step please refer to Phishing Response Guide