www.securetta.fr Open in urlscan Pro
2620:1ec:29:1::45  Public Scan

URL: https://www.securetta.fr/nam/8bcff170-9979-491e-8683-d8ced0850bad/bd1e3202-2e27-489e-906e-2349be1b805b/211faee7-052d-4c9c...
Submission: On December 18 via manual from US — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

Microsoft 365 Security & Compliance

Oops! You clicked on a simulated phish from your security team. It's okay!
Let's learn from this.


To help you identify future phishing emails and improve your own security
posture, take note of some key callouts and info for this campaign (more clues
at the bottom):

 * Theme: Phishes will often incorporate a sense of urgency into common themes
   such as updates/upgrades, password resets, etc. Take note of this before
   clicking on links. 
 * Attachment/link: Combined with a sense of urgency is a call to action; be
   wary of emails that try and persuade you to click/open attachments or links.
   
 * Sender address: Always check the email address of suspicious emails!
   
 * External email tag: Be on the lookout for this tag; nearly all phishing
   emails in your ServiceNow inbox will be flagged with this tag.

Take Note: Always, report an email immediately if you suspect it's a phish. This
allows our security teams to respond quicker to potential threats and reduce
potential damage.


– Your Security Behavior team (security.behavior@servicenow.com)








--------------------------------------------------------------------------------

Hey Laura Sloan, you were just phished as part of a campaign run by your IT team

--------------------------------------------------------------------------------

Don't worry! They have redirected you to this educational page. Let's take a few
minutes to learn...
This is an attack simulated by your company to make you aware of threats.
Website links like https://www.securetta.fr may have been compromised by a
malicious attacker and been used as a way to collect information about you and
your computing environment. It may have also been used to trick you into
downloading malicious content, or granting malicous applications access to your
data. This is called drive-by attack.
The below information could have been collected by an attacker just by your
visit to the website.
IP Address: 2001:41d0:8:d154::14
Browser: Chrome 131
Operating System: Linux OS
Screen Resolution: 1600 x 1200
Browser Dimension: 1600 x 1200
CPU: Linux x86_64, 32 Cores
Browser Plugins: PDF Viewer, Chrome PDF Viewer, Chromium PDF Viewer, Microsoft
Edge PDF Viewer, WebKit built-in PDF
Cookies Enabled: Enabled
Java Enabled: Enabled
Learn more Close