This Torq workflow template helps safeguard businesses by monitoring mailbox folders for phishing threats. Once an IMAP trigger detects new emails in a specific folder, the workflow extracts URLs and attachments, analyzing them with VirusTotal. Results indicating whether content is safe or potentially malicious are then communicated via email and a designated Slack channel. This proactive approach ensures early threat detection, keeping organizational communication channels secure.
Trigger
IMAP
Use Cases
Phishing
Workflow Breakdown
Setup IMAP trigger to retrieve emails in a specific folder
Get all URLs included in the email and make them unique
Scan all URLs and attachments(under 32MB) in the email with VirusTotal
Send an email response back the user and Slack channel on results of the scan
Vendors
Slack, Utils, VirusTotal, Email
Workflow Output
Success/Failure via Email/Slack
Tips
Setup IMAP trigger based on the Torq Documentation at https://docs.torq.io/how-to-guides/use-an-imap-trigger