Simple Method To Analyze An Email For Phishing or Malware

With phishing tactics becoming more sophisticated, proactively safeguard yourself (and your workplace) by deploying the simple methods in this article

1/9/20242 min read

man peeping through monocular
man peeping through monocular

Introduction

Phishing emails are a common tool used by cybercriminals to deceive unsuspecting users into revealing sensitive information. Oftentimes, these malicious emails contain hidden text, cleverly concealed to mimic a legitimate message. By accessing the email's source code, you can unveil these concealed elements and identify potential phishing attempts.


Step 1. Access the Email's Source Code

To analyze an email's source code, you need to begin by accessing the raw or original version of the message. Most email clients offer an option to view the email's source code. In Gmail, for instance, you can open an email and select the "More" menu (represented by three vertical dots) and choose "Show original." This will provide you with the email's complete source code, revealing the behind-the-scenes information that can assist in identifying hidden HTML elements.

2. Inspect Headers and IP Addresses

Now that you are within the email's source code, the first thing we can do is identify the header to see if it contains crucial information about the email's origin. This will usually be at the very top. Start by analyzing the "Received" headers from A to Z. Each "Received" entry provides details about the servers used to transmit the email. Pay attention to the IP addresses, domain names, and any unusual or unfamiliar server names. Cross-reference these details with known legitimate servers associated with the sender's domain.

3. Validate Sender and Return Path

In the source code, locate the "from" and "return path" fields to assess the sender's authenticity. Verify whether the email matches the official email address of the purported sender. Check for any discrepancies, such as slight spelling variations or suspicious domains not associated with the sender. Legitimate organizations often use their own domain names for official email communications.

4. Examine Hyperlinks and Embedded URLs

Within the email's source code, identify any hyperlinks or URLs present. Analyze the URLs' structure, domains, and subdomains for any signs of manipulation or obfuscation. Look for hidden redirects, alterations, or IP addresses instead of familiar domain names. Use online tools like URL scanners or link validators to check for potential threats associated with the URLs.

5. Assess Scripting and Attachments

Pay attention to any JavaScript or VBScript code within the email's source code. Cybercriminals often use malicious scripts to execute harmful actions or launch exploits. If you encounter suspicious scripts, isolate and analyze them further using online malware analysis tools or consult with IT security professionals. Similarly, scrutinize any attachments within the email for indications of malware or executable files.

6. Consider Digital Signatures and Certificates

Legitimate emails from reputable senders may contain digital signatures or certificates as a mark of authenticity. Analyze the source code to locate such signatures and verify their validity. Cross-reference the certificates with trusted authorities or consult the sender directly to confirm their authenticity.

7. Apply Security Tools and Resources

Various security tools and online resources can assist in analyzing email source code. Anti-phishing and antivirus scanners can identify known phishing attempts or malware within emails. Additionally, there are specialized email header analyzers available that can automatically dissect and flag suspicious elements in the source code.

Conclusion

Analyzing an email's source code is an essential skill when it comes to detecting phishing attempts or identifying potential malware. By scrutinizing headers, IP addresses, validating sender information, examining hyperlinks, scripting, and attachments, as well as leveraging security tools, you can augment your ability to distinguish between harmless emails and malicious threats. Remember, always exercise caution and seek assistance from IT professionals or security experts when you encounter suspicious elements in an email's source code. Stay vigilant and prioritize cybersecurity to safeguard against phishing and malware attacks.