
Phishing remains the number one initial access vector for cyberattacks. According to industry reports, 91% of cyberattacks begin with a phishing email. Yet most security teams still rely on ad-hoc investigation methods β checking a few headers here, running a URL through VirusTotal there, and hoping they catch everything.
The cost of getting it wrong is significant. Business Email Compromise (BEC) attacks alone cost organisations an average of $2.73 million per incident in 2024. And the gap between detecting a phishing email and properly investigating it is where most organisations fail.
A structured phishing investigation follows a logical sequence. Each phase builds on the findings of the previous one, ensuring nothing is missed.
Before diving into technical analysis, you need to assess the basics. When was the email received? Who reported it? Has anyone clicked on links or opened attachments? This initial triage determines your investigation priority and scope.
Key questions to answer:
Email headers are the forensic backbone of any phishing investigation. They reveal the true origin of an email, the path it took to reach the recipient, and whether the sender is who they claim to be.
The critical rule: Always read the Received headers from bottom to top. The bottom-most Received header was added by the first server to handle the email β this is closest to the actual sender.
Key headers to examine:
Email authentication is your first line of defence against spoofing. Understanding SPF, DKIM, and DMARC results tells you whether the sending server was authorised to send on behalf of the claimed domain.
SPF (Sender Policy Framework) checks whether the sending IP is listed in the domain's DNS SPF record. A pass means the IP is authorised; a fail means it is not.
DKIM (DomainKeys Identified Mail) verifies a cryptographic signature in the email header. A pass means the email content has not been tampered with since it left the signing server.
DMARC (Domain-based Message Authentication, Reporting & Conformance) ties SPF and DKIM together with a policy. It checks alignment β whether the domain in the From header matches the domains verified by SPF and DKIM.
Phishing emails almost always contain malicious URLs. The challenge is that attackers use multiple layers of obfuscation to hide the true destination.
Safe analysis techniques:
File attachments are the second most common payload delivery mechanism in phishing attacks. Different file types carry different risk levels.
High-risk file types: .exe, .scr, .bat, .cmd, .ps1, .vbs, .js, .wsf, .hta Medium-risk file types: .docm, .xlsm, .pptm (macro-enabled Office files), .pdf, .zip, .rar Lower-risk file types: .docx, .xlsx, .pptx (without macros), .txt, .csv
Analysis steps:
The remaining phases cover sender reputation assessment (domain age, WHOIS data, blacklist checks), content and social engineering analysis (identifying manipulation techniques), IOC extraction (documenting all Indicators of Compromise), verdict and escalation (risk scoring and containment decisions), and post-investigation actions (lessons learned and detection rule creation).
One of the most common barriers to structured phishing investigation is the assumption that you need expensive tools. You don't. Every tool referenced in a professional investigation workflow is freely available:
| Tool | Purpose | URL |
|---|---|---|
| VirusTotal | File/URL/IP reputation | virustotal.com |
| MXToolbox | Email header analysis, DNS lookups | mxtoolbox.com |
| URLScan.io | Safe URL preview and analysis | urlscan.io |
| Any.Run | Interactive malware sandbox | any.run |
| AbuseIPDB | IP reputation database | abuseipdb.com |
| Talos Intelligence | IP/domain reputation | talosintelligence.com |
| PhishTank | Phishing URL database | phishtank.org |
| Google Safe Browsing | URL safety check | safebrowsing.google.com |
| Shodan | Internet-connected device search | shodan.io |
| Have I Been Pwned | Breach data lookup | haveibeenpwned.com |
Every investigation should produce a documented trail. This serves three purposes:
A well-structured investigation log tracks the email metadata, authentication results, URL analysis findings, attachment analysis results, IOC list, risk score, and final verdict β all in one place.
Whether you're a junior SOC analyst handling your first phishing alert or a seasoned security professional looking to standardise your team's process, having a structured investigation workflow transforms ad-hoc responses into professional, repeatable investigations.
The key is consistency. Every phishing email gets the same structured treatment. Every investigation produces the same documentation. Every verdict is backed by evidence.
The Phishing Investigation Toolkit [blocked] from Cyber121 provides the complete 10-phase workflow as a 52-page playbook, a 5-sheet Excel investigation log with auto-calculated risk scores, and a printable quick reference card. Download the free cheat sheet [blocked] to get started.
The Cyber121 team creates practical cybersecurity resources for professionals.