www.emailsecuritymonitor.com
Open in
urlscan Pro
52.228.106.140
Public Scan
URL:
https://www.emailsecuritymonitor.com/x/b4QDbL3CmExkM
Submission Tags: falconsandbox
Submission: On May 31 via api from US — Scanned from CA
Submission Tags: falconsandbox
Submission: On May 31 via api from US — Scanned from CA
Form analysis
0 forms found in the DOMText Content
THIS WAS AN AUTHORIZED PHISHING SIMULATION YOU ARRIVED AT THIS PAGE AFTER CLICKING ON A LINK IN A SIMULATED PHISHING E-MAIL. This phishing e-mail was sent as part of your cybersecurity awareness training. Don't worry, you won't be punished for clicking on this simulation. However, please take a moment to learn more about how to protect yourself from phishing. WHAT'S PHISHING Phishing is a form of social engineering that uses e-mail and deception to trick victims into clicking links, opening files or providing important organizational information unintentionally. Phishing is often the opening move in sophisticated cyber attacks against individuals and organizations. HOW TO SPOT A PHISH There are two main types of phishing e-mails - generic campaigns and ones that are targeted at specific organizations or individuals, known as spear phishing Generic phishing campaigns include ones that look like they came from your bank (or another financial institution), online services such as PayPal, eBay or Apple iTunes Store or Amazon and they may look like parcel shipment information from FedEx, UPS, USPS, Canada Post and others. Targeted phishing or spear phishing campaigns may contain information about you or your organization or may look like a legitimate message from within your organization. WARNING SIGNS FOR FUTURE PHISHING ATTACKS * E-mail states you will lose access to your account(s) if you don't take immediate action. * Links in the e-mail go to unusual websites that don't match the service or organization the e-mail says it is from. You can check these safely in most e-mail programs by hovering over any links. * The e-mail has an attachment referring to an invoice, budget or salary information that you were not previously expecting from a trusted sender. The attachments may be in the form of a Word or Excel spreadsheet and may ask you to enable macros. Don't. * The e-mail address in the reply field does not match with the from/sender information. You can often check this by clicking on the reply address in your e-mail client. You can check this by examining the header information in an e-mail. * The e-mail may contain spelling or grammatical errors. Increasingly though cybercriminals are taking the time to avoid these easy to spot mistakes. INVESTIGATING A SUSPICIOUS E-MAIL * Microsoft Outlook for Windows: Double-click the message to open it in a new window. Select the File tab, and then, at the bottom, click Properties. The data is next to Internet headers. * Outlook Web App (OWA): Double-click the message to open it. Click the options icon (three dots near the top right), and then click View Message Details. * Outlook Express, Windows Mail, or Windows Live Mail (Windows): In the message index, right-click the message, and then select Properties. Click the Details tab. * Outlook for Mac OS X: In your Inbox (or other folder), right-click or control-click the message, and then select View Source. * Thunderbird (Windows, Mac OS X): Click View, select Headers, and then choose All. * Mail (Mac OS X): With the message selected, from the View menu, select Message, and then select either All Headers or Long Headers * Gmail: Open the email you want to check the headers for. Next to Reply, click the Down arrow. Click Show original. The use of any third party logos or trademarks is for educational and illustrative purposes only. Beauceron does not have any relationship with the copyright holder or mark holder nor do any Beauceron customers.