wwwciscofakejobopportunities.linkedincdn.com Open in urlscan Pro
34.198.107.3  Public Scan

Submitted URL: https://wwwciscofakejobopportunities.linkedincdn.com/fd25851ab220c590?l=8
Effective URL: https://wwwciscofakejobopportunities.linkedincdn.com/load_training?guid=5625851fb220c56b&correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf
Submission: On March 11 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://wwwciscofakejobopportunities.linkedincdn.com/training/acceptance?correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf

<form action="https://wwwciscofakejobopportunities.linkedincdn.com/training/acceptance?correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf" class="well form-inline wrp" id="training-form" method="POST">
  <p style="text-align: center;"><button class="btn animated" name="training_ack" type="submit">Acknowledge</button></p>
</form>

Text Content

Email Phishing Training! 
 

Don't worry, this was only a simulated phishing threat sent by the Carnegie
Mellon University Information Security Office to help increase your awareness of
current phishing emails targeting our university. This security awareness &
training exercise is designed to help you protect yourself in future email use.

The phishing email you received is below and the indicators of phishing are
highlighted in red. Please review the indicators and the tips below to avoid
link-based phishing attacks in the future. When you are finished, click on the
"Acknowledge" button below to close.
 

--------------------------------------------------------------------------------

     

 
Phishing Indicators Explained

1. diana.prince@linkedincdn.com

This email address is not a real email account and is not coming from a Linked
In email address. Often cybercriminals will mimic a legitimate email address but
with a different email domain. Even if the email address is from a
"@andrew.cmu.edu" account and is in the directory, it could still be a phishing
message coming from a spoofed email address or compromised account. Report all
suspicious messages to the Information Security Office at iso-ir@andrew.cmu.edu.

2. Dear Student,
 

Phishing messages often use generic greetings or introductions.   

3. "this is a can't miss opportunity!" 
 

Common phishing email messages will prompt you to take action by creating a
sense of urgency.  
 

4. "Click Here to Apply Now!"
 

Common phishing email messages will prompt you to take action such as clicking a
link in order to verify an account, change a password, or verify
information. When hovering the mouse cursor over the link, the true URL reveals
that the link directs users to a phony website:
"https://wwwciscofakejobopportunities.linkedincdn.com/".  Webpages requiring any
type of logging in/authentication to your Andrew account should begin with
"https://login.cmu.edu/". 


Remember to report all suspicious email messages with Phish Alarm or to
iso-ir@andrew.cmu.edu 

 

Watch the video below for tips on how to avoid phishing attacks in the future.
Click the Acknowledge button below when you have finished watching the video.

Click for sound


>> You've got mail.





But should you click on it?






0:02














Acknowledge

This phishing simulation was provided by your employer to help teach you to
recognize commonly-used phishing risks. To appear as realistic as possible, it
may contain the name, brand or logo of unaffiliated third parties. Please do NOT
contact the company that is named or whose brands or logos were used. If you
have any questions or concerns about phishing emails, please contact only your
own employer. Confidential and Proprietary - Privacy Policy