INCIDENT 25-ALPHA

Indicator Extraction & Neutralization Module

RAW HEADER VIEW
Return-Path: <support@paypaI-security-alert.com>
Delivered-To: finance-dept@university.edu
Received: from mail-relay.suspect-server.net (mail-relay.suspect-server.net [192.0.2.145])
    by mx.university.edu with ESMTPS id 4a2b3c
    for <finance-dept@university.edu>; Tue, 07 Nov 2025 09:14:22 -0500 (EST)
Authentication-Results: mx.university.edu;
    dkim=fail reason="signature verification failed";
    spf=softfail (google.com: domain of transition does not designate 192.0.2.145 as permitted sender)
From: "PayPal Security Team" <support@paypaI-security-alert.com>
To: "Finance Dept" <finance-dept@university.edu>
Subject: URGENT: Unauthorized Transaction Detected
Date: Tue, 07 Nov 2025 09:14:10 -0500
Message-ID: <20251107141410.1A2B3C4D@paypaI-security-alert.com>
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"

<div style="font-family: Arial;">
    We detected a login from an unrecognized device.
    <br><br>
    If this was not you, please cancel the transaction immediately:
    <br>
    <a href="http://secure-login-attempt-verif.com/auth/login.php?id=9928">Click Here to Verify</a>
</div>
                

Mission Instructions

Analyze the headers above. Identify the malicious Sender Email, Source IP, and Phishing URL for both incidents. Defang them before submitting your report.

Utility: Defang (Simulated)

Mode: CyberChef Basic

*In a real investigation, use CyberChef's "Defang URL" recipe. This utility simulates that action (Replacing "." with "[.]" and "http" with "hxxp").

Threat Intel Submission Report

Incident #01 (PayPal Spoof)

Incident #02 (HR/Benefits Spoof)