thetrustcloudserver.net
Open in
urlscan Pro
2a01:4f8:1c1c:dde::1
Public Scan
Submitted URL: https://thetrustcloudserver.net/0ff00vhtq9kofbvy
Effective URL: https://thetrustcloudserver.net/awareness/v/0ff00vhtq9kofbvy/index.html
Submission: On November 05 via manual from US — Scanned from US
Effective URL: https://thetrustcloudserver.net/awareness/v/0ff00vhtq9kofbvy/index.html
Submission: On November 05 via manual from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Click Me Trust Logo CP Logo 3rd Logo Hide Banner Member Logo Edit Mode PLEASE READ THE FOLLOWING BEFORE CLICKING OFF THIS PAGE... Your district, in coordination with CyberPools, recently started a simulated phishing campaign. You've clicked on a link in one of these emails. This provides a great opportunity to learn about how to protect yourself from phishing attacks in the future. Please take a few minutes to read through the awareness material below and watch the included video. Afterwards, please confirm that you've done so by clicking the button at the end. Thank you for taking the time to learn more. WHAT IS PHISHING? THE GO-TO SOCIAL ENGINEERING STRATEGY Phishing is the act of tricking you into giving away sensitive information or downloading malicious software onto your PC or company network. Nowadays, it is far easier for a criminal to manipulate you to do something than it is to manually hack into your computer or your company’s network. Phishing is easily carried out over email, it is inexpensive and can be repeated over and over to large lists of recipients. Phishing emails are often interesting. They are created in a way that can influence you to take action, and as a result can look very realistic. PHISHING ATTACK METHODS DECEPTIVE PHISHING An attack where criminals impersonate a legitimate person or company that isn't very targeted. READ MORE DECEPTIVE PHISHING Deceptive phishing is where criminals impersonate a legitimate company or person to try to deceive you in an email, to either click a link, open an attachment or carry out an action of some kind. This action could be an urgent request to transfer money or sensitive information, either in your personal life or in the workplace. SPEAR PHISHING A personalized attack where the criminal uses tailored information to make the email more appealing to you. READ MORE SPEAR PHISHING Spear-phishing is referred to as “the main email attachment threat”. A common manner of tricking targets in spear-phishing is to disguise a malicious attachment in a file extension that the victim will not open as a corporate document in a popular file extension used for various documents. Criminals find information that applies specifically to you, to make the attack much more believable. The email can even appear to come from someone you know. They obtain information for these types of attacks in many ways, and one of the easiest and most common is finding information in the public domain. This is data found online, published in newspapers or magazines or appears elsewhere in the media. WHALING A specialized type of spear phishing that targets an important figure within a company. READ MORE WHALING Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities. As with any phishing endeavor, the goal of whaling is to trick someone into disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts. The attacker may send the target an email that appears as if it's from a trusted source or lure the target to a website that has been created especially for the attack. Whaling emails and websites are highly customized and personalized, often incorporating the target's name, job title or other relevant information gleaned from a variety of sources. 8 TIPS TO SPOT PHISHING SCAMS Previous TIP 1: LOOK FOR MESSAGES WITH MANY SPELLING ERRORS AND VISUAL MISTAKES. If the text contains many errors, you should be careful. Also look at the websites you are guided to and notice whether the displayed menu actually works or if it generates error messages. TIP 2: BE WARY OF GIVING SENSITIVE DATA Whenever you are prompted to divulge personal data in order to update or verify, you should be especially careful. Never enter general username and password information on websites which were opened via a link in an email unless you know its exact background and it corresponds to your company policy. TIP 3: BEWARE ALSO WHEN SENDERS ACT TRUSTWORTHY AND CONFIDENTIAL. Even if you have received the email from your best friend, you should always remember that the message could be corrupt. Therefore, you should always be cautious. This also applies to emails from official organizations such as banks, tax authorities, online stores, travel agencies, airlines, etc. Even emails from your own employer are sometimes infected. It is ultimately not so difficult to make imposter, phishing emails which appear identical to the real messages of legitimate organizations. TIP 4: DO NOT AUTOMATICALLY TRUST A WELL-DESIGNED WEBSITE EVEN IF IT APPEARS EXACTLY AS THE ORIGINAL. Sometimes the phishing emails and websites look just like the real ones. It depends on how well the phisher has done his “homework.” The links, however, are likely to be wrong with misspellings or links to completely different pages (such as www.paypaul.com instead of www.paypal.com). If the page to be visited is a well-known site which you visit frequently, you can also add it to your favorites or manually type the page address in your browser instead of clicking on the link. TIP 5: BEWARE, IF YOU DO NOT KNOW THE SENDER OF THE EMAIL. If possible, do not open any emails from unknown senders. If you do, do not click any link contained in it or at least move your mouse over the link to reveal the real target destination. Often the recipient copy ledger (cc:…) shows the email is being sent to numerous other recipients. TIP 6: BE ESPECIALLY CAREFUL WHEN THE EMAIL IS NOT APPROPRIATELY ADDRESSED OR CONTAINS AWKWARD LANGUAGE. Be suspicious of emails which open with a generic greeting (such as using the non-personalized salutation of To Whom It May Concern) or an inconsistent style (such as colleagues who previously addressed you on a first name basis are now using last names only). The same applies to emails that are written suddenly in a foreign language differing from the usual language. TIP 7: MISTRUST EMAILS PROMPTING YOU FOR A QUICK ACTION. Emails that call for an immediate reaction (such as, prompting for an immediate login to an account) convey a sense of importance typical of phishing attacks. A clear warning is when there is a hint in the email that the data must be entered within a short time period. TIP 8: BE VERY CAREFUL REGARDING ANY EMAIL ATTACHMENTS. Files (for example, programs or even office documents) you receive via email may contain lethal malware. So remain cautious and only open email that you expect and trust. Next EVERYONE IS A TARGET ALWAYS BE AWARE OF PHISHING EMAIL PHISHING Criminals send phishing emails that appear to come from valid sources in an attempt to trick you into revealing personal and financial information WHAT TO LOOK FOR? Inbox Drafts Sent Mail Starred All Mail Junk Deleted Categorized From: notifications@micros0ftnet.com To: you@yourdomain.com Subject: Lets Clean Up! Date: 16.07.17 19:02pm -------------------------------------------------------------------------------- LET'S CLEAN UP It looks like your mailbox is cluttered. In the past week, you received 610 items you're likely to ignore. If you'd prefer not to see that clutter in the future, go here to turn on Clutter. Clutter places these items into their own folder helping you focus on your most important messages. If Clutter gets it wrong, you can move messages and conversations back into the inbox, and vice versa. And Clutter will learn from its mistakes. If you have qeustions, go here. Say hello to a cleaner inbox. Suspicious Sender Address Suspicious Content Misleading and Invalid Link Bad Spelling and Grammar SPEAR PHISHING IS HARDER TO SPOT... Inbox Drafts Sent Mail Starred All Mail Junk Deleted Categorized From: IT@yourcompany.com To: you@yourdomain.com Subject: Important - Internet Downtime Date: 12.07.17 02:14am -------------------------------------------------------------------------------- Hi all, There will be proposed internet downtime next week due to a network upgrade from BT. The downtime is expected to happen overnight; however, there is a good chance that this will carry over to the following morning. For more information on dates and arrangements made around this issue please go to www.bt.co.uk/broadband-downtime/0ert16% Regards, http://www.ma1ware-bounc1ng.biz IT Departament Spoofed Sender Address Sense of Urgency Suspicious Date and Time Misleading and Invalid Link Spoofed Signature AWARENESS VIDEO Please use a different browser. Click here if the video doesn't play Once you have read through the phishing awareness material and watched the video, click the following button to finish the training. I have completed the awareness training Please contact your IT department with any questions. This phishing awareness page is provided by CyberPools. © Copyright 2024 CyberPools. All Rights Reserved.