Description: A detailed analysis of six real-world phishing emails.
Report: Email Phishing Attack Analysis Report
Project Status: Completed
Tags: #pentesting
Email remains one of the most exploited vectors for cyberattacks - reconnaissance, financial scams, credential harvesting, or malware delivery. Phishing remains the top threat to organizations.
Below is a summary of the email phishing analysis process completed for six real-world sample emails between March 2023 and May 2025. You can access (and download) the final report above.
The report includes six diverse incidents.
Spoofed FedEx Delivery Notification (PHISH002_2025)
Tactic: Impersonated FedEx using urgent messaging and Google Cloud hosting
IOC: URL hosted on storage.googleapis[.]com with a hidden JavaScript beacon
Success: The user reported the email before clicking – a testament to security awareness training
Fake Lido Airdrop Email (PHISH003_2025)
Tactic: Pretended to be a crypto airdrop from Lido.fi
Findings: Used a legitimate-sounding Microsoft subdomain (onmicrosoft[.]com) to pass SPF
Action: Blocked domain and link tracking via Postmark (pstmrk[.]it) to prevent spread
Microsoft Account Unusual Login Alert (PHISH004_2025)
Tactic: Fear-based spoofing of a Microsoft security alert
Innovation: Embedded mailto-reply trick disguised as a "Report the user" button
Detection: Tracking pixel used to confirm email open rate
Fake ProtonMail Shutdown Notice (PHISH005_2025)
Tactic: Impersonated ProtonMail with an urgent call to login
Clue: Email sent from a Gmail account (taoheed.lawal1984@gmail[.]com)
IOC: Malicious link redirected to a domain running a compromised WordPress site
McAfee Renewal Scam (PHISH006_2025)
Tactic: Fear-mongering around AV subscription expiry
Evading Defenses: Used Twitter shortened URLs to an obscure destination
Findings: Ultimately linked to a domain (cradletool[.]com) flagged as malicious
Credential Harvesting via HTML Attachment (PHISH008_2025)
Tactic: Generic email with attached spoofed Microsoft login page
Attachment: HTML file with embedded JS, attempting to collect user credentials
Mitre Mapping: T1566.001 - Spearphishing Attachment
Header Image - Photo by Matilda Alloway on Unsplash
Article Image - Photo by Kaptured by Kasia on Unsplash