11.9 Campaign Tracking Across Waves
Campaign Tracking Across Waves
A single compromised account may be an isolated phishing success. Five waves over 72 hours is a campaign. This subsection teaches you to correlate infrastructure, TTPs, and timing across attack waves to build the complete campaign picture.
Identifying Wave 2: internal phishing from compromised accounts
The attacker uses j.morrison’s compromised mailbox to send phishing emails to internal users. These emails bypass Safe Links and Safe Attachments because they originate from a trusted internal sender.
| |
What to look for: Emails from the compromised account containing URLs to domains that are NOT legitimate Microsoft or corporate domains. The subject line may mimic the original phishing campaign or use a new pretext.
Investigation decision point: If the attacker sent internal phishing: this is a campaign, not an isolated compromise. Every recipient is now a potential victim. Run the scoping queries from 11.3 for the new phishing domain(s). Check UrlClickEvents for clicks. Check SigninLogs for compromises.
Correlating attacker infrastructure across waves
Campaigns use multiple domains and IPs. Correlate them to build the infrastructure map.
| |
Build the campaign infrastructure table:
| Wave | Date | Phishing Domain | Attacker IP(s) | Compromised Users |
|---|---|---|---|---|
| 1 | 27 Feb 08:45 | secure-portal-verify.com | 203.0.113.47 | j.morrison |
| 2 | 27 Feb 14:00 | microsoftonline-auth.com | 203.0.113.47, 203.0.113.52 | s.chen, a.patel |
| 3 | 28 Feb 03:00 | (no new phishing — persistence) | 203.0.113.52 | s.chen, a.patel (existing) |
| 4 | 28 Feb 09:00 | sharepoint-secure-docs.com | 203.0.113.89 | r.williams, m.thompson, + 1 |
| 5 | 28 Feb 16:00 | (no new phishing — BEC attempt) | 203.0.113.52 | a.patel (BEC from existing compromise) |
This table is a critical artifact in the IR report (11.11) and drives the hardening recommendations (11.12).
Subsection artifact: The campaign infrastructure correlation queries and the campaign infrastructure table template. These form the campaign tracking section of your AiTM investigation playbook.
Knowledge check
Check your understanding
1. Wave 2 emails were sent from j.morrison's compromised mailbox to internal users. Why might these emails bypass Safe Links?