thetrustcloudserver.net Open in urlscan Pro
2a01:4f8:1c1c:dde::1  Public Scan

Submitted URL: https://thetrustcloudserver.net/0ff00vhtq9kofbvy
Effective URL: https://thetrustcloudserver.net/awareness/v/0ff00vhtq9kofbvy/index.html
Submission: On November 05 via manual from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Click Me
 

Trust Logo

 

CP Logo

 

3rd Logo

 

Hide Banner

 

Member Logo

 

Edit Mode



PLEASE READ THE FOLLOWING BEFORE CLICKING OFF THIS PAGE...
Your district, in coordination with CyberPools, recently started a simulated
phishing campaign. You've clicked on a link in one of these emails. This
provides a great opportunity to learn about how to protect yourself from
phishing attacks in the future.
Please take a few minutes to read through the awareness material below and watch
the included video. Afterwards, please confirm that you've done so by clicking
the button at the end. Thank you for taking the time to learn more.




WHAT IS PHISHING?

THE GO-TO SOCIAL ENGINEERING STRATEGY

Phishing is the act of tricking you into giving away sensitive information or
downloading malicious software onto your PC or company network. Nowadays, it is
far easier for a criminal to manipulate you to do something than it is to
manually hack into your computer or your company’s network. 



Phishing is easily carried out over email, it is inexpensive and can be repeated
over and over to large lists of recipients.



Phishing emails are often interesting. They are created in a way that can
influence you to take action, and as a result can look very realistic.

 




PHISHING ATTACK METHODS

DECEPTIVE PHISHING

An attack where criminals impersonate a legitimate person or company that isn't
very targeted.

READ MORE

DECEPTIVE PHISHING

Deceptive phishing is where criminals impersonate a legitimate company or person
to try to deceive you in an email, to either click a link, open an attachment or
carry out an action of some kind. This action could be an urgent request to
transfer money or sensitive information, either in your personal life or in the
workplace.

SPEAR PHISHING

A personalized attack where the criminal uses tailored information to make the
email more appealing to you.

READ MORE

SPEAR PHISHING

Spear-phishing is referred to as “the main email attachment threat”. A common
manner of tricking targets in spear-phishing is to disguise a malicious
attachment in a file extension that the victim will not open as a corporate
document in a popular file extension used for various documents.

Criminals find information that applies specifically to you, to make the attack
much more believable. The email can even appear to come from someone you know.
They obtain information for these types of attacks in many ways, and one of the
easiest and most common is finding information in the public domain. This is
data found online, published in newspapers or magazines or appears elsewhere in
the media.

WHALING

A specialized type of spear phishing that targets an important figure within a
company.

READ MORE

WHALING

Whaling is a type of fraud that targets high-profile end users such as C-level
corporate executives, politicians and celebrities.

As with any phishing endeavor, the goal of whaling is to trick someone into
disclosing personal or corporate information through social engineering, email
spoofing and content spoofing efforts. The attacker may send the target an email
that appears as if it's from a trusted source or lure the target to a website
that has been created especially for the attack. Whaling emails and websites are
highly customized and personalized, often incorporating the target's name, job
title or other relevant information gleaned from a variety of sources.




8 TIPS TO SPOT PHISHING SCAMS

Previous


TIP 1: LOOK FOR MESSAGES WITH MANY SPELLING ERRORS AND VISUAL MISTAKES.

If the text contains many errors, you should be careful. Also look at the
websites you are guided to and notice whether the displayed menu actually works
or if it generates error messages.




TIP 2: BE WARY OF GIVING SENSITIVE DATA

Whenever you are prompted to divulge personal data in order to update or verify,
you should be especially careful. Never enter general username and password
information on websites which were opened via a link in an email unless you know
its exact background and it corresponds to your company policy.




TIP 3: BEWARE ALSO WHEN SENDERS ACT TRUSTWORTHY AND CONFIDENTIAL.

Even if you have received the email from your best friend, you should always
remember that the message could be corrupt. Therefore, you should always be
cautious. This also applies to emails from official organizations such as banks,
tax authorities, online stores, travel agencies, airlines, etc. Even emails from
your own employer are sometimes infected. It is ultimately not so difficult to
make imposter, phishing emails which appear identical to the real messages of
legitimate organizations.




TIP 4: DO NOT AUTOMATICALLY TRUST A WELL-DESIGNED WEBSITE EVEN IF IT APPEARS
EXACTLY AS THE ORIGINAL.

Sometimes the phishing emails and websites look just like the real ones. It
depends on how well the phisher has done his “homework.” The links, however, are
likely to be wrong with misspellings or links to completely different pages
(such as www.paypaul.com instead of www.paypal.com). If the page to be visited
is a well-known site which you visit frequently, you can also add it to your
favorites or manually type the page address in your browser instead of clicking
on the link.




TIP 5: BEWARE, IF YOU DO NOT KNOW THE SENDER OF THE EMAIL.

If possible, do not open any emails from unknown senders. If you do, do not
click any link contained in it or at least move your mouse over the link to
reveal the real target destination. Often the recipient copy ledger (cc:…) shows
the email is being sent to numerous other recipients.




TIP 6: BE ESPECIALLY CAREFUL WHEN THE EMAIL IS NOT APPROPRIATELY ADDRESSED OR
CONTAINS AWKWARD LANGUAGE.

Be suspicious of emails which open with a generic greeting (such as using the
non-personalized salutation of To Whom It May Concern) or an inconsistent style
(such as colleagues who previously addressed you on a first name basis are now
using last names only). The same applies to emails that are written suddenly in
a foreign language differing from the usual language.




TIP 7: MISTRUST EMAILS PROMPTING YOU FOR A QUICK ACTION.

Emails that call for an immediate reaction (such as, prompting for an immediate
login to an account) convey a sense of importance typical of phishing attacks. A
clear warning is when there is a hint in the email that the data must be entered
within a short time period.




TIP 8: BE VERY CAREFUL REGARDING ANY EMAIL ATTACHMENTS.

Files (for example, programs or even office documents) you receive via email may
contain lethal malware. So remain cautious and only open email that you expect
and trust.


Next


EVERYONE IS A TARGET


ALWAYS BE AWARE OF PHISHING


EMAIL PHISHING

Criminals send  phishing emails that appear to come from valid sources in an
attempt to trick you into revealing personal and financial information


WHAT TO LOOK FOR?

Inbox
Drafts
Sent Mail
Starred
All Mail
Junk
Deleted
Categorized

From: notifications@micros0ftnet.com To: you@yourdomain.com Subject: Lets Clean
Up! Date: 16.07.17 19:02pm

--------------------------------------------------------------------------------


LET'S CLEAN UP

It looks like your mailbox is cluttered. In the past week, you received 610
items you're likely to ignore.

If you'd prefer not to see that clutter in the future,
go here to turn on Clutter.

Clutter places these items into their own folder helping you focus on your most
important messages.

If Clutter gets it wrong, you can move messages and conversations back into the
inbox, and vice versa. And Clutter will learn from its mistakes.
If you have qeustions, go here.

Say hello to a cleaner inbox.


Suspicious Sender Address
Suspicious Content
Misleading and Invalid Link
Bad Spelling and Grammar
 


SPEAR PHISHING IS HARDER TO SPOT...

Inbox
Drafts
Sent Mail
Starred
All Mail
Junk
Deleted
Categorized

From: IT@yourcompany.com To: you@yourdomain.com Subject: Important - Internet
Downtime Date: 12.07.17 02:14am

--------------------------------------------------------------------------------

Hi all,

There will be proposed internet downtime next week due to a network upgrade from
BT. The downtime is expected to happen overnight; however, there is a good
chance that this will carry over to the following morning.

For more information on dates and arrangements made around this issue please go
to
www.bt.co.uk/broadband-downtime/0ert16%

Regards, http://www.ma1ware-bounc1ng.biz

IT Departament


Spoofed Sender Address
Sense of Urgency
Suspicious Date and Time
Misleading and
Invalid Link
Spoofed Signature


AWARENESS VIDEO

Please use a different browser.

 Click here if the video doesn't play

Once you have read through the phishing awareness material and watched the
video, click the following button to finish the training.

I have completed the awareness training


Please contact your IT department with any questions.
This phishing awareness page is provided by CyberPools.
© Copyright 2024 CyberPools. All Rights Reserved.