Why Phishing Works

A phishing lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.

Phishing is an identity attack wrapped in a normal business workflow.

Scenario

You receive an email from a supplier. Subject line: "Invoice #4821 — Payment Due."

The sender name matches a real contact. There is a PDF attachment or a link to "view the invoice online."

You click it.

Attack Chain

Email arrives
  ↓
User clicks the link
  ↓
Fake login page appears
  ↓
Credentials are entered
  ↓
Attacker signs in to the real mailbox
  ↓
Mailbox abuse, resets, or fraud begin

This can take less than a minute from click to compromise.

Observable Evidence

Look for:

  • the preserved message with headers
  • a lookalike domain or mismatched reply-to
  • user confirmation that a link was clicked or credentials were entered
  • unfamiliar mailbox or identity-provider sign-ins
  • new forwarding rules, inbox rules, or password reset activity

These artifacts show what happened. They do not prove analytical correctness on their own.

Operator Response

  1. Preserve the original message before changing or deleting anything.
  2. Validate the sender, links, attachments, and user interaction path.
  3. If credentials may have been entered, revoke sessions and start account containment immediately.
  4. Escalate if privileged accounts, MFA approval, executed code, or multi-user exposure is involved.

Use Investigating a Phishing Report for the governed workflow.

WitnessOps Controls

The response should be tied to: