Security Education

A Real Phishing Email

A line-by-line phishing example framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.

Problem this page solves

Phishing examples often become stories instead of investigations, which makes response decisions drift away from evidence. This page shows a representative phishing artifact set and ties each conclusion to what is directly observable.

Reader outcome

After this page, you should be able to:

  • walk a phishing report through delivery, interaction, credential, and post-access stages
  • state what each artifact supports and what it does not support
  • choose a response gate that matches evidence quality

Mechanism-first walkthrough of a representative phishing artifact/event

This walkthrough is synthetic but mechanically representative. Treat it as an artifact-handling exercise, not as attribution.

Representative lure artifact (preserved message excerpt)

From: Microsoft Account Team <security@microsft-account.com>
Reply-To: noreply@microsft-account.com
Subject: Unusual sign-in activity on your account

We detected unusual activity.
Verify your account now to avoid access restrictions.

Verify My Account:
https://login-microsoft-security-check[.]com/verify

Stage-by-stage artifact walkthrough

Chain stagePrimary artifactWhat to verify in that artifactEvidence boundary
Deliveryphishing-email.emlsender/reply-to mismatch, header path, auth resultssupports suspicious-message classification, not account compromise
Interactionclick telemetry / browser historywhether and when the user opened or clickedsupports interaction timing, not credential exposure
Credential capturefake-page capture + user statementnon-canonical login domain, credential entry claim, unexpected MFA prompt contextsupports likely credential exposure when corroborated
Session establishmentidentity sign-in logssuccessful sign-in from unfamiliar IP/device after interactionsupports potential unauthorized session
Post-access actionsmailbox/cloud audit logsforwarding rules, outbound anomalies, token/app changessupports impact progression if present

Observable indicators and what each indicator supports

Observable indicatorSource artifactWhat it supportsWhat it does not prove by itself
Claimed brand does not match sender domainpreserved email headersimpersonation attemptthat credentials were entered
Link resolves to a non-canonical or lookalike domainresolved URL evidencelure destination is attacker-controlled or untrustedthat compromise already occurred
User confirms entering credentials or approving MFAuser interview + timeline noteaccount-exposure likelihoodthat attacker successfully authenticated
Successful new sign-in after interaction windowidentity provider sign-in logspossible unauthorized session establishmentfull blast radius
New forwarding rule or unusual outbound activitymailbox audit logspost-access activity likely occurredattacker intent or attribution

Response decisions and escalation gates tied to evidence quality

  • Gate A (exposure-only): preserved lure artifact, no click/open evidence.
    • Decision: classify exposure-only, block indicators, notify user, document receipt.
  • Gate B (interaction): click/open evidence exists, but no credential/MFA/session evidence.
    • Decision: preserve full timeline, monitor sign-in telemetry, run endpoint checks if attachment interaction occurred.
  • Gate C (account exposure likely): credential entry, MFA approval, or suspicious new session evidence.
    • Decision: reset credentials, revoke sessions/tokens, inspect mailbox changes, execute Phishing Investigation.
  • Gate D (high impact): privileged account, multi-user spread, or payment/workflow impact.
    • Decision: escalate through governed incident path with Policy Gates before high-impact actions.

What WitnessOps controls support vs cannot guarantee

WitnessOps controls can support:

WitnessOps cannot guarantee:

  • prevention of all phishing delivery attempts
  • complete reconstruction when telemetry is missing, delayed, or altered
  • attacker attribution from a single lure or single sign-in event
  • external recovery outcomes (for example, third-party financial reversal)

Observed vs inferred separation

  • Observed: preserved email headers, resolved URL, click timestamp, sign-in event record, mailbox rule-change log.
  • Inferred: "credentials were definitely stolen," "attacker fully controlled the mailbox," or "scope is complete."

Use observed artifacts to justify immediate containment. Keep inferred claims explicit and provisional until corroborated.

Trust assumptions and limits

Assumptions:

  • email, identity, and mailbox telemetry is retained and time-aligned enough to reconstruct sequence
  • original artifacts are preserved before mailbox cleanup or endpoint remediation
  • high-impact actions follow policy and approval gates

Limits:

  • delayed reporting can remove short-lived evidence (redirect chains, transient sessions)
  • adversaries may evade, suppress, or overwrite telemetry
  • some scope conclusions remain probabilistic until additional corroboration is collected

Next-page handoff

Continue to What To Do If You Clicked for time-bounded recovery actions when interaction has already occurred.