Workflows / Phishing Campaign Triage

Phishing Campaign Triage

Analyze a reported phishing email, scan embedded URLs, research campaign context, and document findings in a triage report.

When an employee reports a suspicious email, the security team needs to quickly determine whether it is a real threat, who it is targeting, and whether others may have received the same message. Slow triage means the window for proactive response closes.

Check the reported email for phishing signals and authentication failures. Scan embedded URLs for malicious content and threat reputation. Search for intelligence on the sender and URLs to determine if they are part of a known campaign. Document everything in a triage report with indicators of compromise and recommended actions.

Used by security operations centers, IT administrators, and incident response teams triaging reported phishing emails. Output is a formatted triage report ready for escalation or user notification.

Steps

1

Check Reported Email for Phishing Signals

Phishing Email Checker icon
Phishing Email Checker

Analyze a reported suspicious email for phishing indicators — authentication failures, suspicious sender patterns, and known threat signatures.

Input: Reported suspicious email headers and sender domain
Output: Phishing signal analysis with authentication failures, risk score, and threat indicators
2

Scan Links in the Email

Security Scanner icon
Security Scanner

Check URLs embedded in the phishing email for malicious content, redirects, and threat reputation.

Input: URLs extracted from the suspicious email
Output: URL threat assessment with malicious content detection and reputation data
3

Research Threat Campaign Context

Web Search icon
Web Search

Search for intelligence on the sender domain and URLs to identify if they are part of a known phishing campaign or threat actor.

Input: Sender domain and URLs from the email
Output: Threat intelligence context on the sender and URLs including campaign attribution
4

Write Phishing Triage Report

Word Documents icon
Word Documents

Document the phishing analysis findings including indicators of compromise, threat attribution, and recommended user guidance.

Input: Email analysis, URL scan results, and threat intelligence
Output: Phishing triage report with IOCs, attribution, and recommended response actions

Benefits

  • Triage phishing reports in minutes instead of hours
  • Detect authentication failures and spoofing indicators automatically
  • Identify campaign attribution from threat intelligence sources
  • Document findings in a structured report for escalation

Related Use Cases

Open Triage Suspicious Emails

Triage Suspicious Emails

Analyze a suspicious email's headers, links, and content to quickly determine whether it is a phishing attempt before taking any action.

Phishing Email Checker icon
Phishing Email Checker
4 agent guides
Open Detect Executive Impersonation Attempts

Detect Executive Impersonation Attempts

Identify business email compromise attacks where fraudsters impersonate executives to request wire transfers or sensitive data.

Phishing Email Checker icon
Phishing Email Checker
4 agent guides
Open Check URLs Before Clicking

Check URLs Before Clicking

Scan suspicious links against threat intelligence feeds before opening them or sharing them with colleagues.

Security Scanner icon
Security Scanner
4 agent guides
Open Investigate Suspicious IP Addresses

Investigate Suspicious IP Addresses

Check IP addresses against abuse databases and threat feeds to assess risk before allowing traffic into your network.

Security Scanner icon
Security Scanner
4 agent guides
Open Research Market Trends

Research Market Trends

Identify emerging market trends by combining web search results with the latest news coverage across your industry.

Web Search icon
Web Search
4 agent guides
Open Monitor Brand Mentions

Monitor Brand Mentions

Track where and how your brand is being discussed across the web and in news coverage.

Web Search icon
Web Search
4 agent guides

Related Workflows

Open Phishing Infrastructure Analysis

Phishing Infrastructure Analysis

Investigate suspected phishing domains through registration analysis, DNS inspection, geolocation, and evidence capture.

DNS Domain icon
DNS Domain
Whois RDAP icon
Whois RDAP
IP Geolocation icon
IP Geolocation
Web Screenshot icon
Web Screenshot
4 steps4 tools
Open Incident Response Toolkit

Incident Response Toolkit

Investigate security incidents by verifying DNS integrity, scanning for compromise indicators, and researching threat intelligence.

security-nuclei icon
security-nuclei
Vulnerability Database icon
Vulnerability Database
Web Search icon
Web Search
DNS Domain icon
DNS Domain
4 steps4 tools