Phishing Incident Response Plan (IRP) / Runbook#
Objective#
Provide a structured workflow for responding to reported phishing emails, coordinating investigation, containment, eradication, and recovery efforts using available tools and procedures. This runbook orchestrates various specialized runbooks.
Scope#
This runbook covers the end-to-end response lifecycle for phishing incidents. It relies on specific sub-runbooks for detailed execution steps.
Phases (PICERL Model)#
Preparation: (Ongoing) Ensure tools are operational, user reporting mechanisms are clear, communication templates exist, and relevant detections (e.g., for known bad domains/URLs) are active.
Identification: Detect/Receive the report, perform initial triage, analyze email artifacts, enrich IOCs, and identify initial impact.
Containment: Limit the spread and impact by blocking malicious IOCs and isolating/containing affected users or endpoints.
Eradication: Remove malicious artifacts (e.g., delete similar emails, potentially remove malware if dropped).
Recovery: Restore affected user accounts or systems to normal operation.
Lessons Learned (Post-Incident): Review the incident and response to identify improvements.
Inputs#
${CASE_ID}: The SOAR case ID created for or associated with the initial report/alert(s).${ALERT_GROUP_IDENTIFIERS}: Relevant alert group identifiers from the SOAR case.${REPORTED_EMAIL_ARTIFACTS}: Information about the reported email, which could include:Email headers (as text or file).
Email body (as text or file).
Attached files (hashes or potentially file content if available safely).
Reported URLs within the email.
Recipient user ID(s).
Sender address/domain.
(Optional)
${EMAIL_GATEWAY_LOG_ID}: Identifier for the email in the gateway logs.
Tools#
Email Analysis Tools (Conceptual/External): Tools to parse headers, extract URLs/attachments, detonate URLs/attachments safely (sandbox). MCP might not have direct tools for deep EML parsing/detonation.
gti-mcp:get_domain_report,get_ip_address_report,get_url_report,get_file_report,search_iocs.secops-mcp:search_security_events,lookup_entity.secops-soar:post_case_comment,get_case_full_details.IOC Containment Runbook:
../ioc_containment.mdCompromised User Account Response Runbook:
../compromised_user_account_response.mdBasic Endpoint Triage & Isolation Runbook:
../basic_endpoint_triage_isolation.mdYou may ask follow up question (To confirm actions).
(Potentially Email Gateway tools if integrated via MCP for searching/deleting emails)
Common Steps:
common_steps/check_duplicate_cases.md,common_steps/enrich_ioc.md,common_steps/find_relevant_soar_case.md,common_steps/document_in_soar.md
Workflow Steps & Diagram#
sequenceDiagram
participant Analyst
participant IRP as phishing_response.md (This Runbook)
participant Preparation as Phase 1: Preparation
participant Identification as Phase 2: Identification
participant Containment as Phase 3: Containment
participant Eradication as Phase 4: Eradication
participant Recovery as Phase 5: Recovery
participant LessonsLearned as Phase 6: Lessons Learned
Analyst->>IRP: Start Phishing Response\nInput: CASE_ID, ALERT_GROUP_IDS, REPORTED_EMAIL_ARTIFACTS
IRP->>Preparation: Verify Prerequisites (Ongoing)
Preparation-->>IRP: Readiness Confirmed
IRP->>Identification: Execute Identification Steps
Identification-->>IRP: Initial Findings, Malicious IOCs, Affected Users/Endpoints
IRP->>Containment: Execute Containment Steps
Containment-->>IRP: Containment Status (IOCs, Users, Endpoints)
IRP->>Eradication: Execute Eradication Steps
Eradication-->>IRP: Eradication Status (e.g., Emails Deleted)
IRP->>Recovery: Execute Recovery Steps
Recovery-->>IRP: Recovery Status (Users/Endpoints)
IRP->>LessonsLearned: Execute Post-Incident Steps
LessonsLearned-->>IRP: Review Complete
IRP-->>Analyst: Incident Response Complete
Phase 1: Preparation (Ongoing)#
Objective: Ensure readiness to respond effectively to phishing reports.
Actions:
Verify tool connectivity (SIEM, SOAR, GTI, Email Gateway).
Ensure user reporting mechanisms (e.g., “Report Phish” button) are functional and users are aware.
Maintain Lists:
List of all domains owned by the organization (to prevent accidental takedowns).
List of personnel authorized to register domains.
Maintain Communication Templates:
Template for notifying employees of ongoing campaigns.
Template for contacting hosting providers for domain takedowns.
Template for informing third parties (e.g., impersonated brands) of abuse.
Template for user warnings/guidance post-incident.
Ensure relevant detections for known phishing indicators (domains, IPs, TTPs) are active in SIEM/Email Gateway.
Familiarity with escalation paths (
.agentrules/escalation_paths.md).(Consider periodic phishing firedrills/simulations).
Phase 2: Identification#
Objective: Analyze the reported email, identify malicious indicators, and determine the initial scope of impact.
Sub-Runbooks/Steps:
Receive Input & Context: Obtain email artifacts,
${CASE_ID},${ALERT_GROUP_IDENTIFIERS}. Get case details viasoar-mcp_get_case_full_details. Check for duplicates (../common_steps/check_duplicate_cases.md).Analyze Email Artifacts:
(Conceptual/Manual Step or External Tool) Parse headers to identify true sender, path, etc.
Extract all URLs, sender domains/IPs, and attachment hashes (
EXTRACTED_IOCs) from the email body and headers.(Conceptual/Manual Step: If attachments are present, submit hashes to GTI/sandbox. If safe detonation is possible, analyze behavior).
Enrich Extracted IOCs:
Initialize
ENRICHMENT_RESULTS. For each IOCIiinEXTRACTED_IOCs:Execute
../common_steps/enrich_ioc.mdwithIOC_VALUE=Iiand appropriateIOC_TYPE.Store results in
ENRICHMENT_RESULTS[Ii].
Identify IOCs confirmed or strongly suspected to be malicious (
MALICIOUS_IOCs).
Categorize Phishing Type:
Based on sender, recipients, content, language, and enriched IOCs, determine the likely phishing category:
Generic Credential Phish: Broad targeting, often impersonating large brands (e.g., Microsoft, Google, banks).
Spear Phishing: Targeted towards specific individuals or roles, often using personalized information.
Whaling: Spear phishing specifically targeting senior executives.
Business Email Compromise (BEC): Typically involves impersonation to request fraudulent wire transfers, gift card purchases, or sensitive data. Often lacks malicious links/attachments.
Brand Impersonation: Mimicking a known brand (e.g., shipping companies, software vendors).
Malware Delivery: Primary goal is to get the user to open a malicious attachment or download malware via a link.
Document the assessed category (
PHISHING_CATEGORY). This helps prioritize and guide further investigation.
(Optional) Verify Initial Findings:
(Consider consulting with a Tier 2/3 analyst or senior team member to verify the initial assessment, enrichment findings, and categorization before proceeding with broader searches, especially for potentially high-impact categories like BEC or Whaling).
Search for Related Activity (SIEM):
Use
secops-mcp_search_security_eventsto search for:Other emails with the same subject, sender, or key body phrases (requires email log source).
Network connections or DNS lookups to
MALICIOUS_IOCs(Domains/IPs).URL clicks involving
MALICIOUS_IOCs(URLs) (requires proxy/DNS logs).File execution events involving
MALICIOUS_IOCs(Hashes) (requires endpoint logs).Logins or other suspicious activity from recipient users around the time the email was received/clicked.
Record findings (
SIEM_FINDINGS).
Identify Initial Impact:
Based on
SIEM_FINDINGSand recipient lists, identify:Users who received similar emails (
SIMILAR_EMAIL_RECIPIENTS).Users who potentially clicked/opened/interacted (
POTENTIAL_COMPROMISED_USERS).Endpoints exhibiting suspicious activity related to the phish (
SUSPICIOUS_ENDPOINTS).
Check Related SOAR Cases:
Prepare list of key entities:
SEARCH_TERMS = POTENTIAL_COMPROMISED_USERS + SUSPICIOUS_ENDPOINTS + MALICIOUS_IOCs.Execute
../common_steps/find_relevant_soar_case.mdwithSEARCH_TERMSandCASE_STATUS_FILTER="Opened".Obtain
${RELATED_SOAR_CASES}(list of potentially relevant open case summaries/IDs).
Document Identification Phase:
Document findings (including
PHISHING_CATEGORYand${RELATED_SOAR_CASES}) using../common_steps/document_in_soar.md.
Phase 3: Containment#
Objective: Prevent further impact from the phishing campaign and contain any resulting compromises.
Sub-Runbooks/Steps:
Network IOC Containment:
For each IOC
MIiinMALICIOUS_IOCs(IPs, Domains, URLs):Execute
../ioc_containment.mdwithIOC_VALUE=MIi, appropriateIOC_TYPE, and${CASE_ID}. Confirm action with analyst. Record status (CONTAINMENT_STATUS[MIi]).(Optional/Manual Step): Submit malicious URLs/Domains to third-party blocklists (e.g., Google Safe Browsing, PhishTank) if appropriate.
User Account Containment:
For each user
UiinPOTENTIAL_COMPROMISED_USERS:Execute
../compromised_user_account_response.mdforUSER_ID=Ui. Confirm actions with analyst. Record status (USER_TRIAGE_STATUS[Ui]).
Endpoint Isolation:
For each endpoint
EiinSUSPICIOUS_ENDPOINTS:Execute
../basic_endpoint_triage_isolation.mdforENDPOINT_ID=Ei. Confirm action with analyst. Record status (ENDPOINT_TRIAGE_STATUS[Ei]).
Verify Containment:
Monitor SIEM (
secops-mcp_search_security_events) for continued activity related toMALICIOUS_IOCsor contained users/endpoints.Document containment status using
../common_steps/document_in_soar.md.
Phase 4: Eradication#
Objective: Remove malicious artifacts related to the phishing campaign.
Sub-Runbooks/Steps:
Delete Malicious Emails:
(Requires Email Gateway/Platform integration or manual action)
Identify all recipients of the malicious email or similar variants (
SIMILAR_EMAIL_RECIPIENTSfrom Phase 2).Use available tools (e.g., Email Gateway console, PowerShell scripts for Exchange/O365) to search mailboxes for emails matching key indicators (Subject, Sender, specific URLs/Hashes).
Execute deletion/quarantine action for identified malicious emails. Document the number of emails deleted/quarantined.
Address Malware (If Applicable):
If the phishing email led to malware execution (identified in Phase 2/3), follow the Eradication steps outlined in the
malware_incident_response.mdrunbook for the affected endpoints.
Document Eradication:
Document actions taken (e.g., email deletion counts) using
../common_steps/document_in_soar.md.
Phase 5: Recovery#
Objective: Restore affected user accounts or systems to normal operation safely.
Sub-Runbooks/Steps:
User Account Recovery:
If user accounts were disabled/passwords reset during Containment, follow procedures to safely re-enable them after confirming the threat is removed (potentially involves re-imaging user endpoint).
Endpoint Recovery:
If endpoints were isolated and potentially infected with malware, follow the Recovery steps outlined in the
malware_incident_response.mdrunbook or a dedicated system recovery runbook.
Lift Containment:
Gradually remove IOC blocks or endpoint/user containment measures once confidence in recovery is high. Monitor closely.
Validate Countermeasures:
After lifting containment or adjusting filters/blocks, verify that legitimate emails or network traffic are not inadvertently blocked by the measures implemented during the incident. Adjust rules/filters as necessary.
Document Recovery:
Document steps taken (including validation) using
../common_steps/document_in_soar.md.
Phase 6: Lessons Learned (Post-Incident)#
Objective: Review the incident and response to identify areas for improvement in prevention, detection, and response.
Sub-Runbooks/Steps: (Consider creating a dedicated Post-Incident Review runbook)
Incident Review Meeting: Convene relevant stakeholders (SOC, IR, Email Security, potentially affected user’s manager) to discuss the incident timeline, root cause (how the phish bypassed defenses, why the user clicked/reported), response actions, and their effectiveness.
Analyze Response & Identify Gaps:
Review the timeline: Was detection timely? Was response initiated promptly? Were containment actions effective?
Review tool effectiveness: Did email filters miss the phish? Did SIEM/EDR alerts trigger appropriately? Were enrichment tools helpful?
Review runbook adherence and effectiveness: Was the IRP followed? Were there gaps or unclear steps?
Identify gaps in prevention (filtering, user awareness), detection (rules, IOC feeds), and response procedures.
Develop Recommendations: Based on identified gaps, formulate specific, actionable recommendations:
Prevention: Update email filter rules, block sender domains/IPs permanently if warranted, improve DMARC/DKIM/SPF checks, enhance user awareness training (potentially targeted based on affected users/departments).
Detection: Develop new SIEM/EDR rules based on observed TTPs or IOC patterns, update IOC feeds, tune existing rules that may have missed activity.
Response: Update this IRP or related runbooks, improve tool integrations, clarify escalation paths.
Update Defenses & Documentation:
Implement approved technical recommendations (e.g., update email filters, SIEM rules).
Update relevant runbooks, policies, and procedures based on lessons learned.
User Awareness Follow-up:
Ensure affected users receive appropriate follow-up and potentially targeted phishing awareness training.
Track Recommendations: Assign owners and deadlines for implementing recommendations and track them to completion.
Final Report: Generate a comprehensive post-incident report using guidelines from
rules-bank/reporting_templates.mdand../report_writing.md.Document Review: Document the review meeting, findings, and recommendations using
../common_steps/document_in_soar.mdor a dedicated reporting system.
Phase 7: Lessons Learned / Runbook Feedback#
Objective: Capture feedback on the runbook’s effectiveness and identify areas for improvement based on this incident.
Actions:
Runbook Effectiveness:
Did this runbook accurately guide the response?
Were there any unclear or missing steps?
Did the tools function as expected based on the runbook steps?
Tool Performance:
Were there any issues with specific MCP tool calls (errors, unexpected results, rate limits)?
Did the tool outputs provide the necessary information?
Process Gaps:
Did the incident reveal gaps in detection, prevention, or other related processes?
Suggestions for Improvement:
Specific recommendations for updating this runbook.
Suggestions for new detection rules or tuning existing ones.
Recommendations for tool configuration changes or new tool requirements.
Documentation: Record this feedback within the SOAR case (
${CASE_ID}) usingcommon_steps/document_in_soar.mdor a dedicated lessons learned repository.
References#
Rubrics#
The following rubric is used to evaluate the execution of this Triage/Response runbook by an LLM agent.
Grading Scale (0-100 Points)#
Criteria |
Points |
Description |
|---|---|---|
Context & Enrichment |
25 |
Correctly extracted entities and enriched them with relevant context (GTI, SIEM). |
Analysis & Decision |
25 |
Analyzed the enriched data to make a sound decision (FP/TP, Escalate/Close). |
Action Execution |
20 |
Performed the required response actions (e.g., isolation, containment) correctly. |
Documentation |
15 |
Clearly documented findings and actions in the case/ticket. |
Operational Artifacts |
15 |
Produced required artifacts: Sequence diagram, execution metadata (date/cost), and summary. |
Evaluation Criteria Details#
1. Context & Enrichment (25 Points)#
10 pts: Accurately extracted key entities (IPs, users, hashes) from the input.
15 pts: Performed necessary enrichment (e.g.,
enrich_ioc) to gather reputation and history.
2. Analysis & Decision (25 Points)#
15 pts: Interpreted the context correctly to determine the nature of the alert.
10 pts: Reached a logical conclusion or next step (e.g., “Escalate to Tier 2” or “Isolate Host”).
3. Action Execution (20 Points)#
10 pts: Called the correct tools to perform response actions (if applicable) or investigative steps.
10 pts: Verified the success of actions or handled errors appropriately.
4. Documentation (15 Points)#
15 pts: Posted a comprehensive comment or update to the SOAR case summarizing the triage.
5. Operational Artifacts (15 Points)#
5 pts: Sequence Diagram: Produced a Mermaid sequence diagram visualizing the steps taken.
5 pts: Execution Metadata: Recorded the date, duration, and estimated token cost.
5 pts: Summary Report: Generated a concise summary of the actions and outcomes.