Learn how to analyze a suspicious e-mail — Part one.
-> What to examine?
To conduct a forensic analysis of a suspicious email, it is essential to examine various components that can provide valuable information about the email’s origin and intent.
Imagine that you have received a suspicious e-mail from "Pirate Bank", a fake bank used only for this case study.
Hello Customer,
We have noticed suspicious activities on your account and need you to verify your information immediately to protect your account.
Click here to verify your account.
Attachments: Important_Document.pdf
Atenciosamente, Sincerely, Support Team Pirate Bank
Now, what you should do?
In Part 2 of this article will demonstrate the use of Tools Preparation.
Read also on Medium!