

1. Case Overview
Case ID: 1010
Analyst: Gabriel Sanchez
Date & Time: March 26, 2025, at 16:40
Severity Level: Low
2. Who
Affected Client: TryHackMe
Involved Entities: Email reviewed from gamble@fashionindustrytrends.xyz sent to miguel.odonnell@tryhackme.com on March 26, 2025, at 16:37:36
3. What
Incident Type: Email Phishing Attempt
Description:
An email was received from gamble@fashionindustrytrends.xyz, sent to miguel.odonnell@tryhackme.com on March 26, 2025, at 16:37:36. The email offered the recipient a free vacation, indicating a potential phishing attempt.
4. When
Date & Time of Initial Alert: March 26, 2025, at 16:37:36
Date & Time of Investigation Start: March 26, 2025, at 16:40
Date & Time of Resolution: March 26, 2025
5. Where
Affected Systems: miguel.odonnell@tryhackme.com
Relevant Logs & Data Sources Used:
- SIEM Queries: [Logs reviewed from Sysmon, PowerShell, Email logs]
- Correlation with Other Events: [Any linked incidents]
6. Why
Root Cause Analysis:
Due to an unoptimized email filtering system, this phishing email was not flagged and was successfully delivered to miguel.odonnell@tryhackme.com. The use of an unusual top-level domain contributed to its evasion of detection mechanisms.
7. Investigation Steps
Initial Alert Review:
- Opened SOC dashboard and reviewed details
- Verified email sender, subject, and attachments
- Checked email headers for spoofing indicators
- Correlated event with other security logs for additional findings
8. Mitigation
The sender domain was blocked to prevent similar incidents, and email filtering policies were updated to detect such phishing attempts more effectively.
9. Conclusion
This phishing attempt was identified and mitigated without impact. Security measures have been improved to enhance the detection and prevention of similar threats in the future.