Suspicious Email Analyzer
SKILL.md
Suspicious Email Analyzer
Analyze emails for phishing attempts, scams, and security threats to protect against fraud.
Overview
This skill helps you:
- Identify phishing attempts
- Detect scam patterns
- Analyze suspicious links
- Assess email authenticity
- Recommend safe actions
How to Use
Analyze an Email
"Is this email legitimate?"
"Check this email for phishing"
"Analyze this suspicious message"
Provide Email Content
Include:
- Sender email address
- Subject line
- Full email body
- Any links (don't click them!)
Threat Indicators
Red Flags Checklist
## Email Security Assessment
### Sender Analysis
- [ ] **Domain mismatch**: Display name doesn't match email domain
- [ ] **Lookalike domain**: microsoft.corn, amaz0n.com
- [ ] **Free email for business**: Official company using gmail.com
- [ ] **Random characters**: x7y2z@suspicious.com
- [ ] **No reply-to**: Cannot respond to sender
### Content Analysis
- [ ] **Urgency pressure**: "Act NOW", "Account suspended"
- [ ] **Threat language**: "Legal action", "Account closure"
- [ ] **Too good to be true**: Prize winner, inheritance
- [ ] **Generic greeting**: "Dear Customer" vs your name
- [ ] **Grammar/spelling errors**: Unusual mistakes
- [ ] **Requests sensitive info**: Password, SSN, credit card
- [ ] **Unexpected attachment**: Especially .exe, .zip, .docm
### Link Analysis
- [ ] **Hover reveals different URL**: Display vs actual link
- [ ] **Shortened URLs**: bit.ly, tinyurl hiding destination
- [ ] **HTTP (not HTTPS)**: Insecure for sensitive pages
- [ ] **Misspelled domains**: paypa1.com, netlfix.com
- [ ] **IP address URLs**: http://192.168.1.1/login
- [ ] **Excessive subdomains**: secure.login.verify.site.com
### Technical Indicators
- [ ] **Missing security headers**: SPF, DKIM, DMARC fail
- [ ] **Unusual sending time**: 3 AM from "local bank"
- [ ] **Bulk email markers**: Mass mail headers present
Analysis Output
Threat Assessment Report
# Email Security Analysis
## Summary
| Attribute | Value |
|-----------|-------|
| **Threat Level** | š“ HIGH / š MEDIUM / š” LOW / š¢ SAFE |
| **Confidence** | [X]% |
| **Verdict** | Likely Phishing / Suspicious / Legitimate |
## Sender Analysis
### Email Address
- **Display Name**: PayPal Security Team
- **Actual Address**: security@paypa1-verify.com
- **Status**: š“ SUSPICIOUS
### Issues Found
1. ā Domain "paypa1-verify.com" is not official PayPal
2. ā Uses number "1" instead of letter "l"
3. ā Domain registered 3 days ago
## Content Analysis
### Subject: "Urgent: Your Account Has Been Limited"
- š“ Uses urgency tactic
- š“ Threatening language
### Body Issues
| Issue | Example | Severity |
|-------|---------|----------|
| Generic greeting | "Dear Customer" | š” Medium |
| Urgency | "within 24 hours" | š“ High |
| Threat | "account suspended" | š“ High |
| Grammar | "Please to verify" | š Medium |
### Requests Made
- ā Asks to click link
- ā Requests login credentials
- ā Asks for personal information
## Link Analysis
### Link Found
- **Display**: "Verify Your Account"
- **Actual URL**: http://paypa1-verify.com/login
- **Status**: š“ DANGEROUS
### URL Issues
1. ā Domain is not paypal.com
2. ā Uses HTTP (insecure)
3. ā Suspicious path mimics login
## Conclusion
### Verdict: š“ PHISHING ATTEMPT
This email shows multiple indicators of a phishing attack:
1. Fake sender domain mimicking PayPal
2. Urgency and threat tactics
3. Link to fraudulent website
4. Request for login credentials
### Recommended Actions
1. ā
Do NOT click any links
2. ā
Do NOT reply to this email
3. ā
Report to phishing@paypal.com
4. ā
Delete the email
5. ā
If clicked link, change password immediately
Common Scam Types
Phishing Categories
## Phishing Attack Types
### 1. Credential Phishing
**Goal**: Steal login credentials
**Pretends to be**: Banks, email providers, social media
**Tactics**: Fake login pages, urgent account issues
**Example**: "Your account password expires today"
### 2. CEO/Business Email Compromise
**Goal**: Wire transfer fraud
**Pretends to be**: Executive, vendor, partner
**Tactics**: Urgency, authority, secrecy
**Example**: "Please wire $50K for urgent deal, keep confidential"
### 3. Technical Support Scam
**Goal**: Remote access or payment
**Pretends to be**: Microsoft, Apple, ISP
**Tactics**: Fake virus alerts, account compromise
**Example**: "We detected virus on your computer, call now"
### 4. Invoice/Payment Scam
**Goal**: Payment to fraudulent account
**Pretends to be**: Vendor, client, internal
**Tactics**: Fake invoices, changed bank details
**Example**: "Updated bank account for invoice payment"
### 5. Package Delivery Scam
**Goal**: Credentials or malware
**Pretends to be**: FedEx, UPS, USPS, DHL
**Tactics**: Failed delivery, tracking issues
**Example**: "Package could not be delivered, click to reschedule"
### 6. Tax/Government Scam
**Goal**: Personal info or payment
**Pretends to be**: IRS, SSA, government agency
**Tactics**: Legal threats, refund promises
**Example**: "IRS Notice: Immediate action required"
Legitimate vs Phishing Comparison
## How to Spot the Difference
### Banking Email Example
| Aspect | Legitimate | Phishing |
|--------|------------|----------|
| From | alerts@chase.com | chase-alert@gmail.com |
| Greeting | "Hi John Smith" | "Dear Customer" |
| Urgency | "Review when convenient" | "IMMEDIATE ACTION REQUIRED" |
| Links | Links to chase.com | Links to chase-verify.com |
| Action | "Log in to your account" | "Enter password here" |
| Tone | Professional, calm | Threatening, urgent |
| Personalization | Account ending 4532 | No specifics |
Action Guidelines
What To Do
## Response Protocol
### If Email is SUSPICIOUS (š“š )
1. ā Do NOT click links
2. ā Do NOT download attachments
3. ā Do NOT reply
4. ā Do NOT call numbers in email
5. ā
Verify through official channels
- Go to official website directly (type URL)
- Call known customer service number
6. ā
Report the email
- Forward to IT security
- Report to company being impersonated
7. ā
Delete the email
### If You Already Clicked
1. ā
Disconnect from internet (if malware suspected)
2. ā
Change passwords immediately
3. ā
Enable 2-factor authentication
4. ā
Monitor accounts for suspicious activity
5. ā
Run antivirus scan
6. ā
Report to IT department
7. ā
Consider credit monitoring if financial info shared
### Reporting Channels
- **Generic phishing**: reportphishing@apwg.org
- **IRS scams**: phishing@irs.gov
- **FTC**: reportfraud.ftc.gov
- **Company specific**: Usually phishing@company.com
Email Header Analysis
What to Check
## Email Header Deep Dive
### Key Headers to Review
| Header | What It Shows |
|--------|---------------|
| From | Displayed sender |
| Return-Path | Actual reply address |
| Received | Server path (bottom = origin) |
| SPF | Sender authorized? |
| DKIM | Signature valid? |
| DMARC | Policy result |
### Authentication Results
| Result | Meaning |
|--------|---------|
| pass | Legitimate |
| fail | Likely spoofed |
| softfail | Possibly spoofed |
| none | No policy set |
Limitations
- Cannot access actual email headers without them being provided
- Cannot verify real-time domain reputation
- Cannot click or analyze live links
- Some sophisticated phishing may pass analysis
- Legitimate emails may have some warning signs
- Human judgment is essential for final decision
Weekly Installs
0
Repository
claude-office-sā¦s/skillsGitHub Stars
10
First Seen
Jan 1, 1970
Security Audits