www.securetta.fr
Open in
urlscan Pro
2620:1ec:29:1::45
Public Scan
URL:
https://www.securetta.fr/nam/8bcff170-9979-491e-8683-d8ced0850bad/bd1e3202-2e27-489e-906e-2349be1b805b/211faee7-052d-4c9c...
Submission: On December 18 via manual from US — Scanned from FR
Submission: On December 18 via manual from US — Scanned from FR
Form analysis
0 forms found in the DOMText Content
Microsoft 365 Security & Compliance Oops! You clicked on a simulated phish from your security team. It's okay! Let's learn from this. To help you identify future phishing emails and improve your own security posture, take note of some key callouts and info for this campaign (more clues at the bottom): * Theme: Phishes will often incorporate a sense of urgency into common themes such as updates/upgrades, password resets, etc. Take note of this before clicking on links. * Attachment/link: Combined with a sense of urgency is a call to action; be wary of emails that try and persuade you to click/open attachments or links. * Sender address: Always check the email address of suspicious emails! * External email tag: Be on the lookout for this tag; nearly all phishing emails in your ServiceNow inbox will be flagged with this tag. Take Note: Always, report an email immediately if you suspect it's a phish. This allows our security teams to respond quicker to potential threats and reduce potential damage. – Your Security Behavior team (security.behavior@servicenow.com) -------------------------------------------------------------------------------- Hey Laura Sloan, you were just phished as part of a campaign run by your IT team -------------------------------------------------------------------------------- Don't worry! They have redirected you to this educational page. Let's take a few minutes to learn... This is an attack simulated by your company to make you aware of threats. Website links like https://www.securetta.fr may have been compromised by a malicious attacker and been used as a way to collect information about you and your computing environment. It may have also been used to trick you into downloading malicious content, or granting malicous applications access to your data. This is called drive-by attack. The below information could have been collected by an attacker just by your visit to the website. IP Address: 2001:41d0:8:d154::14 Browser: Chrome 131 Operating System: Linux OS Screen Resolution: 1600 x 1200 Browser Dimension: 1600 x 1200 CPU: Linux x86_64, 32 Cores Browser Plugins: PDF Viewer, Chrome PDF Viewer, Chromium PDF Viewer, Microsoft Edge PDF Viewer, WebKit built-in PDF Cookies Enabled: Enabled Java Enabled: Enabled Learn more Close