Back to Resources
Phishing Indicators Guide
Cheat Sheet
Quick reference guide for identifying phishing emails and campaigns. Includes email header indicators, content analysis, URL analysis, and IOC types.
Phishing Indicators Reference
Quick reference guide for identifying phishing emails and campaigns.
Email Header Indicators
SPF/DKIM/DMARC Failures
- SPF FAIL: Sender not authorized to send from domain
- DKIM Missing/Fail: Email signature invalid or missing
- DMARC Not Aligned: Email fails domain alignment check
Red Flags:
- SPF:
softfailorfail - DKIM: Missing or
fail - DMARC:
quarantineorrejectpolicy violation
Header Mismatches
- Return-Path ≠ From Address: Sender mismatch
- Reply-To ≠ From Address: Reply-to different from sender
- Message-ID Pattern: Suspicious or unusual format
- X-Mailer: Unusual or missing mailer identification
Subject Line Indicators
Urgency Language
- "Urgent action required"
- "Your account will be suspended"
- "Immediate attention needed"
- "Verify your account now"
- "Limited time offer"
Threatening Language
- "Account will be closed"
- "Legal action required"
- "Payment overdue"
- "Security breach detected"
Too Good to Be True
- "You've won!"
- "Claim your prize"
- "Free gift"
- "Exclusive offer"
Sender Indicators
Display Name Spoofing
- Legitimate company name with suspicious email
- Slight variations:
micr0soft.comvsmicrosoft.com - Unicode characters that look like letters
Suspicious Domains
- Recently registered domains
- Free email services (Gmail, Yahoo) from "business"
- Typosquatting:
amaz0n.com,paypa1.com - Subdomain abuse:
microsoft-security.com
Content Indicators
Grammar & Spelling
- Poor grammar and spelling errors
- Unprofessional language
- Inconsistent formatting
- Mixed languages
Generic Greetings
- "Dear Customer"
- "Dear User"
- "Hello"
- No personalization
Suspicious Links
- Hover reveals different URL than displayed
- Shortened URLs (bit.ly, tinyurl.com)
- IP addresses instead of domains
- HTTP instead of HTTPS
- Suspicious TLDs (.tk, .ml, .ga)
Attachment Indicators
Suspicious File Types
.exe- Executable files.scr- Screen saver (often malware).zip- Compressed files (may contain malware).js- JavaScript files.vbs- VBScript files.docm- Macro-enabled documents
File Name Red Flags
- "Invoice.pdf.exe" - Double extension
- "Document.scr" - Screen saver masquerading
- Generic names: "document", "file", "readme"
- Urgency in filename: "urgent", "important"
URL Analysis
Suspicious URL Patterns
- IP Address:
http://192.168.1.1/login - Typosquatting:
microsft.com,gooogle.com - Subdomain Abuse:
microsoft-security.com - Path Manipulation:
microsoft.com.evil.com - Shortened URLs:
bit.ly/xxxxx,tinyurl.com/xxxxx
URL Red Flags
- HTTP instead of HTTPS
- Suspicious TLDs (.tk, .ml, .ga, .xyz)
- Recently registered domains
- No SSL certificate
- Suspicious redirect chains
Behavioral Indicators
Requested Actions
- Click link to verify account
- Download and open attachment
- Enter credentials on website
- Provide personal information
- Send money or gift cards
- Install software
Social Engineering Tactics
- Authority impersonation (IT, HR, Executive)
- Urgency and time pressure
- Fear tactics (account closure, legal action)
- Curiosity (you have a message, package delivery)
- Reciprocity (free gift, exclusive offer)
Technical Indicators
Email Client Warnings
- "This message looks suspicious"
- "Be careful with this message"
- "External sender" warning
- Attachment blocked
Delivery Anomalies
- Unusual send time (off-hours)
- Bulk email characteristics
- High bounce rate
- Multiple recipients (BCC abuse)
IOC Types
Email IOCs
- From Address: Sender email
- Reply-To: Reply address
- Subject Line: Email subject pattern
- Message-ID: Unique message identifier
Network IOCs
- IP Addresses: Sender IPs, C2 servers
- Domains: Sender domains, malicious URLs
- URLs: Phishing links
File IOCs
- File Hashes: MD5, SHA1, SHA256
- File Names: Attachment names
- File Types: Attachment extensions
Verification Steps
1. Header Analysis
- Check SPF/DKIM/DMARC
- Verify Return-Path
- Review Message-ID
- Check Received headers
2. URL Verification
- Hover over links (don't click)
- Check domain registration
- Verify SSL certificate
- Check URL reputation
3. Attachment Analysis
- Check file type
- Verify file hash
- Submit to VirusTotal
- DO NOT OPEN suspicious files
4. Sender Verification
- Verify sender email domain
- Check for typosquatting
- Verify company contact methods
- Contact sender through known channels
Common Phishing Types
Credential Phishing
- Fake login pages
- Account verification requests
- Password reset requests
Business Email Compromise (BEC)
- Executive impersonation
- Vendor payment fraud
- Invoice scams
Malware Delivery
- Malicious attachments
- Drive-by downloads
- Malicious links
Spear Phishing
- Targeted attacks
- Personal information used
- Appears legitimate
Response Actions
Immediate
- Do not click links
- Do not open attachments
- Do not reply
- Report to security team
- Delete email
Investigation
- Extract IOCs
- Check threat intelligence
- Analyze headers
- Document findings
Containment
- Block sender domain
- Block malicious URLs
- Block IP addresses
- Update blocklists
Last Updated: [Date]
Version: 1.0