Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Forensics

Phishing Analysis

The forensic examination of suspected phishing emails to identify deceptive techniques, malicious infrastructure, and attribution indicators.

Definition

Phishing analysis is the process of systematically examining suspicious emails to determine whether they are malicious, how they attempt to deceive recipients, and what infrastructure they leverage. Analysts inspect email headers, authentication records, embedded URLs, attachments, and visual spoofing techniques to build a complete picture of the attack. Findings inform incident response, threat intelligence, and defensive controls.

Why It Matters

Phishing remains the leading initial access vector in breaches, making accurate triage a critical DFIR skill — misclassifying a phishing email can delay containment and allow credential theft or malware deployment to go undetected. Proper analysis also surfaces attacker infrastructure such as lookalike domains and bulletproof hosting, enabling proactive blocking across the organization.

How It Works

Analysis begins with parsing raw email headers (RFC 5322) to reconstruct the delivery path and verify authentication results: SPF checks whether the sending IP is authorized, DKIM validates the cryptographic signature, DMARC confirms policy alignment, and ARC preserves the authentication chain across forwarding hops. Analysts then inspect the visible sender address and display name for homoglyph substitutions — Unicode characters that visually mimic legitimate letters — as well as link-display mismatches where anchor text differs from the true destination URL. Embedded URLs are extracted and submitted to reputation feeds and sandboxes, while attachments are statically analyzed for macros, exploits, or second-stage payloads. QR codes embedded in images require an additional decoding step before their destination URLs can be evaluated.

DFIR Platform

Phishing Email Checker

DFIR Lab's Phishing Email Checker accepts raw .eml files or RFC 5322 headers and runs them through 26+ analysis modules covering SPF/DKIM/DMARC/ARC validation, homoglyph domain detection, link-display mismatch detection, QR code decoding from embedded images, URL reputation checking, and AI-powered verdict scoring. A free public version is available at dfir-lab.ch/phishing-check; full API and CLI access is available through the platform.

View Documentation

Related Concepts

SPF (Sender Policy Framework)DKIM (DomainKeys Identified Mail)DMARC (Domain-based Message Authentication, Reporting and Conformance)QR Phishing (Quishing)Business Email Compromise (BEC)

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free