12.9 Campaign Tracking Across Waves
Campaign Tracking Across Waves
A single compromised account may be an isolated phishing success. Five waves over 72 hours is a campaign. This subsection teaches you to correlate infrastructure, TTPs, and timing across attack waves to build the complete campaign picture.
Identifying Wave 2: internal phishing from compromised accounts
The attacker uses j.morrison’s compromised mailbox to send phishing emails to internal users. These emails bypass Safe Links and Safe Attachments because they originate from a trusted internal sender.
| |
What to look for: Emails from the compromised account containing URLs to domains that are NOT legitimate Microsoft or corporate domains. The subject line may mimic the original phishing campaign or use a new pretext.
Investigation decision point: If the attacker sent internal phishing: this is a campaign, not an isolated compromise. Every recipient is now a potential victim. Run the scoping queries from 11.3 for the new phishing domain(s). Check UrlClickEvents for clicks. Check SigninLogs for compromises.
Correlating attacker infrastructure across waves
Campaigns use multiple domains and IPs. Correlate them to build the infrastructure map.
| |
Build the campaign infrastructure table:
| Wave | Date | Phishing Domain | Attacker IP(s) | Compromised Users |
|---|---|---|---|---|
| 1 | 27 Feb 08:45 | secure-portal-verify.com | 203.0.113.47 | j.morrison |
| 2 | 27 Feb 14:00 | microsoftonline-auth.com | 203.0.113.47, 203.0.113.52 | s.chen, a.patel |
| 3 | 28 Feb 03:00 | (no new phishing — persistence) | 203.0.113.52 | s.chen, a.patel (existing) |
| 4 | 28 Feb 09:00 | sharepoint-secure-docs.com | 203.0.113.89 | r.williams, m.thompson, + 1 |
| 5 | 28 Feb 16:00 | (no new phishing — BEC attempt) | 203.0.113.52 | a.patel (BEC from existing compromise) |
This table is a critical artifact in the IR report (11.11) and drives the hardening recommendations (11.12).
Subsection artifact: The campaign infrastructure correlation queries and the campaign infrastructure table template. These form the campaign tracking section of your AiTM investigation playbook.
Knowledge check
Attacker infrastructure evolution across waves
Sophisticated campaigns rotate infrastructure between waves to evade IP-based blocking. Track the evolution:
| |
What this reveals: If the attacker uses the same IP across all waves: a single block stops the campaign. If different IPs per wave: the attacker is rotating infrastructure and IP-based blocking alone is insufficient — you need token binding or FIDO2 to prevent the authentication bypass itself.
TI sharing: The campaign infrastructure table (IPs, domains, email addresses) should be shared with your ISAC, industry peers, and threat intelligence sharing platforms. The IOCs help other organisations detect the same campaign before the attacker pivots to new infrastructure.
Try it yourself
Using the Northgate Engineering scenario data, build the complete campaign infrastructure table: one row per wave with phishing domain, attacker IPs, compromised users, and the technique used (external phishing, internal phishing, or persistence access). This table is a key artifact in the IR report — practice building it now so the structure is familiar during a real incident.
What you should produce
A 5-row table (one per wave) showing the progression: Wave 1 external phishing from a single domain, Wave 2 internal phishing from the compromised mailbox with a new domain, Wave 3 persistence activity (no new phishing), Wave 4 internal phishing from two compromised mailboxes with a third domain, Wave 5 BEC attempt. The table tells the story of the campaign's evolution.
Check your understanding
1. Wave 2 emails were sent from j.morrison's compromised mailbox to internal users. Why might these emails bypass Safe Links?