That Link could have been malicious...

Scroll to learn more.

This was an authorized phishing simulation. If you ever suspect an email to be a phishing attack, or have any questions or feedback related to this exercise, please email john.doe@example.com

Credential Phishing

Attackers frequently try to steal employees’ credentials so they can access customer information, employee data, and finances.

Emails in credential phishing scams are designed to create a false sense of trust. The email links direct you to a malicious site imitating a real login page to steal your information.

They often appeal to your emotions with narratives like account access suspended, payment transfer complete, or outstanding balance. Other phishing emails may look like normal, routine correspondence.

Phishers imitate company email addresses, signatures, and logos. Even if an email looks like it is from a legitimate company, you still need to exercise caution.

Who is Targeted?

Never enter login credentials or other sensitive information into an unverified website, even if the site looks legitimate. If the layout or images look strange, you might have landed on a fake copy of a real site. Look out for old logos, broken images, and stretched or fuzzy images.

Remember, just because a site uses HTTPS or has a green padlock, it doesn’t guarantee the site is safe. Attackers can easily obtain free SSL certificates that give their phishing websites an air of legitimacy.

Keep your usernames, passwords, and security questions and answers private. Always verify that you are on an official website before you provide your credentials. Report any suspicious messages.

Quick Tips

What can you do to avoid falling for a credential phishing email?

Check that the email is from the real sender before opening. Call or email the sender to confirm it is legitimate.

Only navigate to trusted sites by using bookmarks or by typing the domain in the browser.

Some attackers modify domains to catch targets off guard. For example, if the correct domain was www.example.com, the phishers may register “examp1e.com” or “example.co”.

No reputable company will ask for your password over email.

Check a link without clicking

Every hyperlink contains two parts: the anchor and the destination.

The anchor is the visible portion of the hyperlink that you click on. An anchor can be a URL, plain text, or even an image. An anchor can be misleading, because it doesn’t tell you where a link truly leads. The destination tells you where the link truly leads.

Desktop (OSx and Windows):

Hover your cursor over the link to view the URL.

Mobile Devices (Android, iOS, Windows):

Touch and hold the link until a pop-up menu appears.

Shortened URLs

Be suspicious of shortened URLs that mask the true destination URL. If hyperlinks contain shortened URLs, you cannot verify the destination URL by hovering your curser on your desktop or touching and holding the link on your mobile device!

How can I tell if an email is a Phish?

Below is an Interactive Email. Use the tab keys to navigate the Indicators of this phishing email

From: payment@paymentsreturn.com

Subject: PayPal account warning

Greetings, dear Partner!

Please give an attention to this letter!

Last time we have encountered with multiple occasions of unusual

activity performed by manipulation with online services

of our clients' accounts. Attackers are obtaining admittance to accounts by stealing login data and passwords. This can be very dangerous for your money and for your reputation, so we recommend you to make several actions, in order to prevent such situations.

To guard your funds, verify please your account data. Ten we will be able to approve your post address and personal data. We strongly recommend to keep passwords and ligin data, in the

secure place.

To verify your account data, please fill and send us the next form via e-mail or via post. Our post address is:

2211 North First Street
San Jose, CA 95131
Attached File: Data Verification Form
If we will not receive your reaction on this notification, we will be forced to
block your online servie until
your account data will not be verified

Take a quick quiz

True or False

Attackers steal employees’ credentials to access customer information, employee data, and finances.

A shortened URL has been verified and is always safe to click.

No reputable company will ask for your password over email.

A site with HTTPS uses encryption, and is always safe to visit.

You scored 0 out of 4 correct. Good Job! Could do better.