top of page
it support sheffield

Email & Identity Security

What to Do When a Phishing Attack Happens

What is a phishing attack?

A phishing attack is when attackers impersonate a trusted sender — such as a colleague, supplier, bank, or Microsoft — to trick users into clicking malicious links, opening attachments, or entering login details.


Modern phishing attacks are increasingly convincing. They often:

  • Use real branding and language

  • Target Microsoft 365 and cloud logins

  • Lead to follow-on attacks such as ransomware, invoice fraud, or data theft


Phishing is now one of the most common entry points for wider cyber incidents.


First signs of a phishing incident

You may be dealing with a phishing attack if:

  • A user clicked a suspicious link or entered credentials

  • A login alert appears from an unusual location

  • Emails are sent from an account the user didn’t send

  • Mailbox rules appear that forward or hide emails

  • MFA prompts appear unexpectedly


Even if “nothing seems wrong”, phishing incidents should always be treated seriously.


Immediate actions (first 15–30 minutes)

  1. Change the affected user’s password immediately Start with email and Microsoft 365. If the password is reused elsewhere, change those too.

  2. Revoke active sessions Force sign-out across devices to remove attacker access.

  3. Check MFA status

  4. Confirm MFA is enabled

  5. Look for newly added authentication methods (phone numbers, apps)

  6. Preserve evidence

  7. Save the phishing email (including headers if possible)

  8. Screenshot login alerts or suspicious activity

  9. Note the time and user affected


Assess what the attacker may have done

Once credentials are compromised, attackers often move quickly.


Check for:

  • Mailbox rules that auto-forward or delete emails

  • OAuth app permissions added without approval

  • Admin role changes

  • Internal phishing emails sent from the compromised account

  • Unusual file access in SharePoint or OneDrive

  • Login attempts from multiple countries


This step determines whether the incident is limited or part of a wider breach.


What NOT to do

  • Don’t ignore it because “nothing happened.”  Many attacks are quiet at first.

  • Don’t just change the password and move on.  Access may persist elsewhere.

  • Don’t blame the user.  Fear reduces reporting and increases risk next time.


Containment and remediation

After initial response:

  • Reset passwords for affected users and any linked admin accounts

  • Review and tighten MFA and conditional access policies

  • Remove unauthorised mailbox rules and app permissions

  • Check whether phishing was delivered to other users

  • Update email filtering rules if needed


When does phishing become a reportable incident?

Phishing itself isn’t always reportable, but it can become one if:

  • Personal data is accessed or exfiltrated

  • Financial fraud occurs

  • The attacker gains access to sensitive systems


In these cases, legal and regulatory guidance may be required.


Note: This is general guidance, not legal advice.


Preventing future phishing attacks

Most successful phishing incidents exploit a combination of:

  • Weak or missing MFA

  • Over-privileged users

  • Poor visibility into login activity

  • Lack of user awareness


Key controls include:

  • MFA for all users (especially admins)

  • Conditional access policies

  • Regular user awareness training

  • Strong email filtering

  • Monitoring for suspicious sign-ins and rule changes


Signs the attacker may still have access

After remediation, watch for:

  • Reappearing mailbox rules

  • Repeated MFA prompts

  • New OAuth app permissions

  • Logins from unfamiliar locations

  • Unexpected password reset requests


If any appear, treat it as an active incident.


People Also Ask

What should I do if I clicked a phishing link?

Change your password immediately, revoke active sessions, and report the incident so activity can be checked properly.


Can phishing lead to ransomware?

Yes. Phishing is one of the most common ways attackers gain initial access before deploying ransomware or stealing data.


Is MFA enough to stop phishing?

MFA significantly reduces risk but isn’t foolproof. Attackers may use MFA fatigue or token theft, so layered security is important.


How do attackers use compromised email accounts?

They often monitor conversations, redirect invoices, launch internal phishing, or access cloud files.


Should phishing incidents be reported?

They should always be reported internally. External reporting depends on data exposure and regulatory requirements.

TL;DR

  • Act quickly: if a link was clicked or credentials entered, assume the account is compromised.

  • Change passwords immediately (starting with email and Microsoft 365).

  • Revoke active sessions and check for suspicious login activity.

  • Look for follow-on attacks: mailbox rules, MFA changes, and internal phishing.

  • Warn staff: attackers often target multiple users at once.

  • Review controls: MFA, email filtering, and user permissions reduce repeat attacks.

Phishing Attack Response
steve harper

Written by:

Steve Harper

Commercial Director

Sources

NCSC (UK), Microsoft Security documentation, CISA guidance, ENISA phishing guidance, NIST incident handling framework, industry email-security best practices.

Relating Insights

So, why IT Desk?

deceleration.png

Proactive & Reactive Support

In 2024, we achieved an average response time of 13 seconds. Most IT support providers respond anywhere between 30 seconds and 1 minute.

Not only this, 99.5% of our feedback we received was rated 4 out of 4, making this one of our best years yet!

trophy.png

Award Winning

Recognised by Three Best Rated as one of the 'Three Best Rated' IT Service Providers in the Rotherham area. Our feedback definitely reflects this!

Acknowledged by Barnsley & Rotherham Chamber of Commerce over the years for Excellence in Customer Service and Commitment to People Development.

certified.png

Experienced & Certified

Awarded the 'Investors in People' certification, which is an industry standard that shows IT Desk as being actively committed to developing and supporting it's employees.

 

From apprentices to managers to solution engineers, our team of people is truly unique - often described by them as a 'family'!

Reliable & Consistent

Founded in Rotherham in 2006, we started out offering IT support to local businesses. Over the years, we've expanded to serve clients throughout the UK.

With over a decade of experience, we offer exceptional localised IT support, particularly in South Yorkshire, and specialise in assisting SMEs.

Innovative Solutions for Businesses

19+

Years of Experience

A legacy of excellence IT services.

70%

Increase in Efficiency

Streamlined operations and improved workflow.

99.9%

Client Satisfaction Rate

Trusted by businesses across all sectors for superior service.

1200+

Projects Completed

Delivering cutting-edge solutions for a seamless digital future.

Chris W.png
Steve Harper.png
BG---Name---Chloe-Day.png
BG---Name---Morgan-C.png

Experts in the field. Driven by success.

Speak to our team today.

IT Desk are a leader in business growth through consultancy. Contact us today for a no-obligation chat. Your Success, We’re Part of IT.

Book a meeting with our team.

Click below to see our live calendar and book a meeting with our team of experts.

bottom of page