Skip to content

Securing the Future of Work: Agent Behavior Analytics with Google Cloud — Read the Blog

How to Investigate a Phishing Incident

  • Jul 08, 2019
  • Pramod Borkar
  • 1 minute to read

Table of Contents

    In early 2018, Legacy Health, a Portland, Oregon-based hospital group, announced it had suffered a data breach. The medical records of 38,000 patients were taken after a successful phishing attack against one of its employees. Phishing attacks typically involve social engineering, which is the use of deception to manipulate individuals into divulging their credentials, clicking a weaponized link, or opening a malicious attachment. For example, a bogus call from the IT helpdesk, where the user is asked by the attacker to confirm their username and password, is a common technique. Triaging phishing emails can be a major drain on SOC resources due to the volume of alerts that teams receive.

    In this video, we simulate a phishing incident investigation with legacy SIEM tools using logs collected in Exabeam Data Lake and then compare it with a modern SIEM’s approach by using Exabeam Advanced Analytics to perform the same investigation. The key advantages of conducting a phishing investigation with Exabeam Advanced Analytics include:

    • Improved phishing threat detection via behavior analysis (UEBA) of email data and email security alerts alongside data from other security solutions
    • Reduced time required to investigate phishing incidents using Exabeam Smart Timelines which automatically stitch together both normal and abnormal behavior into machine-built incident timelines
    • Improved mean time to detection and response resulting from automated investigation, containment, and mitigation playbooks powered by security orchestration, automation, and response (SOAR)

    Watch the video

    Watch the video below for a step-by-step walkthrough of a phishing incident investigation using a modern SIEM.

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Blog

      Catching the Quiet Threats: When Normal Isn’t Safe

    • Blog

      UEBA vs. XDR: Rethinking SIEM Augmentation in the AI Era

    • Blog

      How Exabeam Helps Organizations Adapt to Australia’s Privacy Reforms

    • White Paper

      Using MITRE ATT&CK® in Threat Hunting and Detection

    • Blog

      Can You Detect Intent Without Identity? Securing AI Agents in the Enterprise 

    • Blog

      Securing the Future of Work: Agent Behavior Analytics with Google Cloud

    • Show More