auth-verify.com Open in urlscan Pro
63.32.231.118  Public Scan

Submitted URL: https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fadd%2dto.password.land%2fXK1A5aTJOQkV1T0orb3VzbTdGUUVmU...
Effective URL: https://auth-verify.com/pages/665d1332fb1c1110c43f581d5e0d7c55/XK1A5aTJOQkV1T0orb3VzbTdGUUVmUklaTjBabVk5VmFsZExsZjU4OXhZ...
Submission: On May 15 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 
 
 


OOPS, YOU'VE JUST CLICKED ON A PHISHING LINK!

Don't worry: this is no cause for concern, since this was a simulated phishing
e-mail.

When we capture the click rate, this is done solely for statistical purposes.
Rest assured that no consequences will result for individual employees if they
happen to have clicked.

Real phishing e-mails, on the other hand, can cause major damage by stealing
valuable information or infecting our IT systems with malware.

Follow these tips and have a look on the video below to protect yourself and
ALDI from phishing attacks:

Take your time; look carefully and think before you click links in e-mails or
open attachments.

Check your e-mails for signs of a phishing attack.

Use the "Phish Alert Button" to report e-mails that seem suspicious to you.

Talk with your colleagues and share any experiences you've had related to
phishing. Ask if they have also received suspicious e-mails.


HOW CAN I RECOGNIZE PHISHING EMAILS?

The following additional red flags of the email indicate a phishing attack:

 1. Check the Sender's Email Address: Verify the sender's email address.
    Phishing emails often use email addresses that mimic legitimate ones but may
    have slight variations.
 2. Be Skeptical of Urgent Requests: Phishing emails often create a sense of
    urgency, pressuring you to take immediate action. Be cautious if an email
    demands quick responses or threatens consequences for not complying.
 3. Review the Content: Look for grammatical errors, misspellings, or awkward
    language. Legitimate organizations usually have professional communication.
 4. Check for Generic Greetings: Phishing emails often use generic greetings
    like "Dear Customer" instead of addressing you by name.
 5. Hover over Links: Hover your mouse over links without clicking to reveal the
    actual URL. If the link doesn't match the supposed destination, it might be
    a phishing attempt.
 6. Attachments: Avoid opening attachments from unknown or unexpected sources.
    Malicious attachments can contain malware.
 7. Verify with the Sender: If in doubt, contact the supposed sender using a
    known, trusted method to confirm the legitimacy of the email.


WHERE CAN I GATHER INFORMATION OR CONTACT FOR INQUIRIES?

If you have any questions, feel free to contact the Ulrich Siedentop or André
Windhausen.

Privacy Policy

|

Legal Notice