February 20, 2025
12
min read

Email Investigations: The Epicenter of Security Analysis

Email remains at the heart of most security investigations, from phishing alerts, insider threats to business email compromise (BEC for both internal and third-party emails) incidents. While many teams focus solely on whether a malicious link was clicked, the real challenge lies in understanding email activities and other user behaviors in the big picture - what users do after an incident occurs. This post explores how email credentials represent full user identities and why this makes them prime targets for attackers. Using real examples, like the case of an Acme Corp administrator with extensive system access, we demonstrate how attackers can easily identify and target high-value accounts through LinkedIn and other public sources. Traditional email investigations face significant challenges: time-consuming manual correlation, complex access requirements across multiple systems, and difficulty in assessing the full blast radius of compromised accounts. Command Zero addresses these challenges through unified data analysis, AI-guided investigations, automated timeline analysis, and intelligent narrative building. The post concludes by emphasizing that email investigations can't be treated as checkbox exercises - they require sophisticated tools that can handle complex data correlation while guiding investigators toward meaningful conclusions. This approach transforms email investigations from time-consuming manual processes into rapid, comprehensive analyses that any investigator can conduct effectively.

In this article

Introduction

Email investigations intersect with virtually every security incident response. Whether it's an HR-led insider threat case or a potential compromise, email activity provides crucial context about what happened before, during, and after an event.

Most playbooks focus narrowly on whether a user clicked a malicious link, then jump straight to endpoint analysis. This misses critical signals in the user behavior. The noteworthy questions are: What did the user do in their email after the click? Did they start sharing sensitive files? Did they initiate unusual communications with accounts payable? How did their behaviors change in SaaS applications or other connected systems?  

These post-compromise behaviors are nuanced. They often reveal the true scope of an incident, and they are easily overlooked by oversubscribed teams or static playbooks. More interesting patterns can be uncovered by asking questions like: Who else received these suspicious emails? What behavior changes did they demonstrate after receiving these emails or clicking the suspicious links?  

These patterns can take hours to run down, so a complex email investigation can consume the majority of an analyst’s day.  

The hard truth: Emails are full user identities

Email is one of the top threat vectors for a reason. It is used by every knowledge worker to interact with the outside world. In today’s integrated identity structure, email credentials represent more than just access to communications – they are full user identities. When compromised, attackers inherit all the permissions and influence of that account. So email compromise effectively becomes account takeover.  

Take this real example: Examining the permissions of a user like Shannon at Acme Corp reveals extensive administrative access across multiple critical systems. Attackers can easily identify these high-value targets (admins with extensive access) through LinkedIn, derive their email addresses, and launch targeted social engineering campaigns. To cause devastating impact, attackers don't need to "spray and pray" across 50 users when they can focus on 2-3 privileged accounts.  

Gaining access Shannon’s email gives attackers access to the keys of the kingdom.  

Breaking down investigation barriers for email

Traditional email investigations face three key challenges:

  1. Speed vs. Accuracy Trade-offs: Thoroughly investigating email patterns while simultaneously checking other systems for signs of compromise requires significant time. An analyst needs to examine:
  1. Email subject line patterns
  1. Communications with external addresses
  1. Whether other internal users are participating in email dialogues with suspicious external addresses
  1. File sharing behaviors and patterns.  

These manual correlations can consume the majority of an analyst's day.

  1. Access Complexity: Email investigations require pivoting across multiple systems. For instance, when investigating potential business email compromise (BEC), analysts need to quickly determine:
  1. What files were shared externally (via Microsoft Sharepoint, OneDrive or similar)
  1. Whether suspicious email forwarding rules were created (via Microsoft Exchange or similar)
  1. If the compromised identity has accessed sensitive systems through SSO providers like Okta or Entra (the two most prominent identity providers we see in customer environments)
  1. What SaaS applications the user can access via SSO (like GitHub or similar)
  1. Whether there's unusual activity in Microsoft Office365 or other cloud platforms
  1. Blast Radius Assessment: When an email account is compromised, security teams must rapidly determine the scope of potential damage. This means:
  1. Mapping access across multiple identity providers (both Azure AD and Okta)
  1. Understanding SaaS application access through SSO
  1. Identifying potential data exfiltration through file sharing or email attachments
  1. Assessing the user's permissions and group memberships

Modern email investigation requirements

Effective email investigations need to:

  • Move beyond binary “received/didn’t receive email” or "clicked/didn't click malicious link" analysis to examine post-compromise behaviors
  • Automatically correlate email activities with identity systems, file sharing, and SaaS access
  • Provide guided investigation paths to help analysts explore relevant angles without going down rabbit holes
  • Enable rapid assessment of potential blast radius when credentials are compromised
  • Support complex use cases like BEC attacks, spear phishing, and insider threats

How Command Zero improves email investigations

Command Zero transforms email investigations through several key innovations:

  1. Unified Data Analysis: The platform abstracts data collection and interpretation across multiple sources, allowing investigators to pivot seamlessly between email, identity systems, and cloud platforms. This integration gives analysts immediate visibility into the full scope of potential compromise.
Analysts can review data across all connected systems in the Command Zero interface.

  1. AI-Guided Investigation: The platform's AI capabilities provide contextual guidance through:
  1. Recommended questions based on current findings
  1. Automated investigation paths based on responses.  
  1. Guard rails that prevent "rabbit holing" into unproductive paths
  1. Context-aware follow-up questions that guide analysts toward promising leads
LLMs suggest relevant follow-up questions, generate new branches to enhance analysts' flows.

  1. Automated Timeline Analysis: The system analyzes events across all connected platforms and builds a comprehensive timeline. In roughly 95% of cases, investigations reveal no true security concern, but when they do, the system helps analysts rapidly understand the blast radius and pivot from "risk" to "active threat" assessment.
Command Zero generates timelines based on noteworthy questions and answers.

  1. Narrative Building: Command Zero helps investigators construct the incident narrative by:
  1. Pulling out key facts and correlations that might be missed
  1. Identifying connections between seemingly unrelated events
  1. Providing a structured approach to documentation
  1. Maintaining investigative guardrails to prevent scope creep
  1. Making sure that no pattern gets overlooked
Command Zero builds full reports with verdicts based on the investigation flow, the goal of the analysis and historical context of the subject.

This approach differs fundamentally from traditional solutions by providing what amounts to an expert "riding shotgun" with the analyst. It decompresses the psychological burden on investigators by removing knowledge and access limitations, allowing them to conduct thorough investigations in minutes rather than hours.

Conclusion

Email remains the foundation of most security investigations, whether they involve business email compromise, phishing, or insider threats. Our experience shows that if an investigation doesn't touch email, it probably should - email behavior provides crucial context for almost every security incident.

Command Zero's approach transforms email investigations from a time-consuming manual process into a rapid, comprehensive analysis that any investigator can conduct effectively. By automating data correlation and providing expert guidance, we enable security teams to understand the true scope of incidents and respond decisively.

The reality of modern security is that email investigations can't be treated as a checkbox exercise. They require sophisticated tools that can handle complex data correlation while guiding investigators toward meaningful conclusions. This is how we turn the challenge of email investigations into an opportunity for more effective security response.

To see how Command Zero can help transform email investigations, please book a demo with our team.  

Alfred Huger
Cofounder & CPO

Continue reading

Investigations
Highlight

Investigate password spray attacks with accuracy and speed

Password spray attacks remain a persistent threat to enterprise environments, serving as a crucial barometer of an organization's security health. These attacks, while common, offer valuable insights into an organization's authentication posture and prompt important questions about targeted identities, potential unnoticed breaches, and possible data leaks from previous breaches. Traditional investigation methods pose challenges when it comes to analyzing password spray: Time constraints, multiple system navigation and potentially superficial investigations. Command Zero transforms password spray investigations by: increasing efficiency and automation, ensuring comprehensive analysis and transparent reporting.
Alfred Huger
Jan 22, 2025
6
min read
Investigations
Highlight

2024 Learnings and 2025 Predictions Through Frequently Asked Questions

Disclaimer: This is not yet another 2025 predictions post where the author states the obvious (or the outrageous). Instead, we cover three frequently asked questions about Command Zero, what these questions taught us about 2024 and how they shaped our predictions for 2025. In this post, we will cover three frequently asked questions and responses: Who is Command Zero is for? How does Command Zero complement existing security operations investments? How is Command Zero similar to or different from AI-powered SOC analysts? AI-powered chatbots? We will also share our three predictions for 2025 based on these questions and observations. Happy holidays and we hope you enjoy this format!
Erdem Menges
Dec 19, 2024
7
min read
Investigations
Highlight

Navigating complexity with structure: Using pre-built sequences for security investigations

What analysts consistently do during complex investigations makes the difference between consistent, thorough analyses and spinning their wheels in the sand. While sophisticated investigation processes require bespoke steps by definition, security operations teams need to standardize best practices where possible to save valuable cycles and deliver consistent outcomes. Command Zero delivers structure to help navigate complexity by delivering expertise via questions and facets. Facets are pre-built sequences for investigations, and they transform security analysis because: Analysts of any skill level can build them as needed without coding or scripting.
Alfred Huger
Dec 11, 2024
5
min read
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.