auth-verify.com
Open in
urlscan Pro
63.32.231.118
Public Scan
Submitted URL: https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fadd%2dto.password.land%2fXK1A5aTJOQkV1T0orb3VzbTdGUUVmU...
Effective URL: https://auth-verify.com/pages/665d1332fb1c1110c43f581d5e0d7c55/XK1A5aTJOQkV1T0orb3VzbTdGUUVmUklaTjBabVk5VmFsZExsZjU4OXhZ...
Submission: On May 15 via manual from US — Scanned from DE
Effective URL: https://auth-verify.com/pages/665d1332fb1c1110c43f581d5e0d7c55/XK1A5aTJOQkV1T0orb3VzbTdGUUVmUklaTjBabVk5VmFsZExsZjU4OXhZ...
Submission: On May 15 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
OOPS, YOU'VE JUST CLICKED ON A PHISHING LINK! Don't worry: this is no cause for concern, since this was a simulated phishing e-mail. When we capture the click rate, this is done solely for statistical purposes. Rest assured that no consequences will result for individual employees if they happen to have clicked. Real phishing e-mails, on the other hand, can cause major damage by stealing valuable information or infecting our IT systems with malware. Follow these tips and have a look on the video below to protect yourself and ALDI from phishing attacks: Take your time; look carefully and think before you click links in e-mails or open attachments. Check your e-mails for signs of a phishing attack. Use the "Phish Alert Button" to report e-mails that seem suspicious to you. Talk with your colleagues and share any experiences you've had related to phishing. Ask if they have also received suspicious e-mails. HOW CAN I RECOGNIZE PHISHING EMAILS? The following additional red flags of the email indicate a phishing attack: 1. Check the Sender's Email Address: Verify the sender's email address. Phishing emails often use email addresses that mimic legitimate ones but may have slight variations. 2. Be Skeptical of Urgent Requests: Phishing emails often create a sense of urgency, pressuring you to take immediate action. Be cautious if an email demands quick responses or threatens consequences for not complying. 3. Review the Content: Look for grammatical errors, misspellings, or awkward language. Legitimate organizations usually have professional communication. 4. Check for Generic Greetings: Phishing emails often use generic greetings like "Dear Customer" instead of addressing you by name. 5. Hover over Links: Hover your mouse over links without clicking to reveal the actual URL. If the link doesn't match the supposed destination, it might be a phishing attempt. 6. Attachments: Avoid opening attachments from unknown or unexpected sources. Malicious attachments can contain malware. 7. Verify with the Sender: If in doubt, contact the supposed sender using a known, trusted method to confirm the legitimacy of the email. WHERE CAN I GATHER INFORMATION OR CONTACT FOR INQUIRIES? If you have any questions, feel free to contact the Ulrich Siedentop or André Windhausen. Privacy Policy | Legal Notice