Security Education

Why Phishing Works

A phishing lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.

Problem this page solves

Phishing reports often jump from "user clicked" to broad cleanup without a clear compromise model. This page gives a stage-based response path so containment matches evidence quality.

Reader outcome

After this page, you should be able to:

  • map a phishing report to a specific chain stage
  • collect stage-appropriate signals before intrusive actions
  • choose containment with explicit escalation gates

Mechanism-first scenario model (phishing chain stages)

Scenario: a supplier-themed invoice email sends a user to a fake login page.

  1. Delivery — lure reaches the inbox and appears routine.
  2. Interaction — user opens the message and follows a link or attachment.
  3. Credential capture — credentials, MFA approval, or session token are exposed.
  4. Session establishment — attacker authenticates to the real service.
  5. Post-access actions — forwarding rules, resets, internal phishing, or payment fraud attempts begin.

Observable signals per stage

StageDirectly observable signals
DeliveryPreserved message, header path, sender/reply-to mismatch, domain age/reputation
InteractionClick telemetry, URL resolution, attachment open or execution events
Credential captureUser confirmation, fake-login artifact, authentication prompt mismatch
Session establishmentUnfamiliar successful sign-in, new session/device, impossible-travel pattern
Post-access actionsMailbox rule changes, outbound burst, reset attempts, administrative anomalies

Practical response/containment sequence with decision gates

  1. Preserve source artifacts (email, URL, attachment hash, user timeline).
  2. Validate interaction depth (opened only, clicked, credentials entered, MFA approved).
  3. Gate A: No click and no execution -> classify as exposure-only, block indicators, document.
  4. Gate B: Click or file open without credential evidence -> isolate endpoint if needed, monitor auth telemetry, continue investigation.
  5. Gate C: Credential, MFA, or token exposure likely -> revoke sessions, reset credentials, remove attacker changes, run the governed phishing workflow.
  6. Gate D: Privileged account, multi-user spread, or financial workflow impact -> escalate through the governed incident path.

What WitnessOps controls can support vs cannot guarantee

WitnessOps can support:

WitnessOps cannot guarantee:

  • prevention of every phishing attempt
  • complete reconstruction when telemetry is missing, delayed, or tampered with
  • attacker attribution from a single artifact

Observed vs inferred separation

  • Observed: message artifact, resolved URL, sign-in record, rule-change log.
  • Inferred: "credentials were stolen," "attacker intended fraud," or "blast radius is complete."

Use observed evidence to justify immediate containment. Treat inferred claims as hypotheses until corroborated.

Trust assumptions and limits

Assumptions:

  • logs are retained and time-aligned enough for sequence reconstruction
  • original artifacts are preserved before cleanup
  • responders follow policy gates for high-impact actions

Limits:

  • delayed reporting can hide first access
  • adversaries may evade or remove telemetry
  • some scope decisions remain probabilistic until additional evidence arrives

Next-page handoff

Continue to 7 Phishing Tricks Attackers Use for recurring lure patterns and how they map back to this chain.