.
When a suspected phishing email or user report arrives: validate, contain, remove access, investigate, notify, recover, and document — fast and measured.
Subject: [ACTION REQUIRED] Suspected Phishing — [User] / [Ticket#]
Team,
[User] reported a suspected phishing email at [timestamp]. Initial classification: [phishing / credential harvest / malicious attachment].
Containment actions taken: [email quarantined / blocked sender / forced password reset for X].
Investigation in progress — SOC lead: [name]. Please stand by for updates.
— InfoSec
Subject: Security Notice — Potential Phishing Email
Hi [User],
You recently reported a suspicious email sent to your account at [time]. We’ve quarantined the message and reviewed your account activity. At this time, we do not see evidence of account compromise.
Out of caution, please:
1. Change your password now.
2. Confirm you did NOT enter credentials into any webpage linked from that email.
3. If you did enter credentials, reply immediately and we will force a password reset and enable extra checks.
If you notice any unusual activity (password prompts, unexpected multi-factor prompts, or unexpected messages), contact IT immediately.
— Security Team
We identified a targeted phishing campaign that affected a limited number of employee inboxes. We contained the campaign, reset affected credentials, and are working with authorities where appropriate. No customer systems were accessed. We will provide additional updates as available.
Scenario: Finance team receives an email “Invoice overdue — pay now” with an attachment “Invoice_123.docx”.
Exercise steps for analyst trainee:
Expected trainee actions (checklist):
Pass: ≥ 75%
Incident ID:
Date/time reported:
Reporter:
Summary:
Classification (phish/credential harvest):
Affected users/accounts:
Containment actions:
Forensic findings:
Impact assessment:
Remediation actions completed:
Open actions / follow-ups:
Lessons learned:
If you want, I can: