Day-17: — “The Unusual Sign-In
📨 Raw Email (Captured)
From: "Microsoft account team" <no-reply@access-accsecurity.com>
Reply-To: solutionteamrecognizd02@gmail.com
To: phishing@pot
Subject: Microsoft account unusual signin activity
Importance: high
X-Priority: 1
Date: Mon, 31 Jul 2023 21:11:10 +0000
Return-Path: bounce@providentusezn.co.uk
X-Sender-IP: 89.144.44.4
Authentication-Results:
spf=none smtp.mailfrom=providentusezn.co.uk
dkim=none
dmarc=permerror header.from=access-accsecurity.com
Received:
from providentusezn.co.uk (89.144.44.4)
from VI1EUR06FT059.eop-eur06.prod.protection.outlook.com
from AS4P192CA0020.outlook.office365.com
from DS0PR19MB7299.namprd19.prod.outlook.com
Content-Type: text/html; charset="UTF-8"
Message-ID: <01b046e7-624f-4fac-a212-16aa7576a019@VI1EUR06FT059.eop-eur06.prod.protection.outlook.com>🧠 HTML Body Extract
🎯 Challenge Objectives
1️⃣ Identify at least five indicators of phishing.
2️⃣ Trace the sender’s infrastructure.
3️⃣ Explain how the attacker bypassed email filters.
4️⃣ Draft your final incident report summary.
🏁 Bonus Challenge (Hard Mode)
PreviousDay-16: The Gummies Trap — Investigate a Suspicious OTTO Newsletter EmailNextDay-18: JAPANESE PHISHING EMAILS Attacks Anaysis
Last updated