wwwciscofakejobopportunities.linkedincdn.com
Open in
urlscan Pro
34.198.107.3
Public Scan
Submitted URL: https://wwwciscofakejobopportunities.linkedincdn.com/fd25851ab220c590?l=8
Effective URL: https://wwwciscofakejobopportunities.linkedincdn.com/load_training?guid=5625851fb220c56b&correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf
Submission: On March 11 via manual from US — Scanned from DE
Effective URL: https://wwwciscofakejobopportunities.linkedincdn.com/load_training?guid=5625851fb220c56b&correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf
Submission: On March 11 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://wwwciscofakejobopportunities.linkedincdn.com/training/acceptance?correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf
<form action="https://wwwciscofakejobopportunities.linkedincdn.com/training/acceptance?correlation_id=68bd5b19-3167-4dfd-a938-726aaf9effdf" class="well form-inline wrp" id="training-form" method="POST">
<p style="text-align: center;"><button class="btn animated" name="training_ack" type="submit">Acknowledge</button></p>
</form>
Text Content
Email Phishing Training! Don't worry, this was only a simulated phishing threat sent by the Carnegie Mellon University Information Security Office to help increase your awareness of current phishing emails targeting our university. This security awareness & training exercise is designed to help you protect yourself in future email use. The phishing email you received is below and the indicators of phishing are highlighted in red. Please review the indicators and the tips below to avoid link-based phishing attacks in the future. When you are finished, click on the "Acknowledge" button below to close. -------------------------------------------------------------------------------- Phishing Indicators Explained 1. diana.prince@linkedincdn.com This email address is not a real email account and is not coming from a Linked In email address. Often cybercriminals will mimic a legitimate email address but with a different email domain. Even if the email address is from a "@andrew.cmu.edu" account and is in the directory, it could still be a phishing message coming from a spoofed email address or compromised account. Report all suspicious messages to the Information Security Office at iso-ir@andrew.cmu.edu. 2. Dear Student, Phishing messages often use generic greetings or introductions. 3. "this is a can't miss opportunity!" Common phishing email messages will prompt you to take action by creating a sense of urgency. 4. "Click Here to Apply Now!" Common phishing email messages will prompt you to take action such as clicking a link in order to verify an account, change a password, or verify information. When hovering the mouse cursor over the link, the true URL reveals that the link directs users to a phony website: "https://wwwciscofakejobopportunities.linkedincdn.com/". Webpages requiring any type of logging in/authentication to your Andrew account should begin with "https://login.cmu.edu/". Remember to report all suspicious email messages with Phish Alarm or to iso-ir@andrew.cmu.edu Watch the video below for tips on how to avoid phishing attacks in the future. Click the Acknowledge button below when you have finished watching the video. Click for sound >> You've got mail. But should you click on it? 0:02 Acknowledge This phishing simulation was provided by your employer to help teach you to recognize commonly-used phishing risks. To appear as realistic as possible, it may contain the name, brand or logo of unaffiliated third parties. Please do NOT contact the company that is named or whose brands or logos were used. If you have any questions or concerns about phishing emails, please contact only your own employer. Confidential and Proprietary - Privacy Policy