login.strongencryption.org Open in urlscan Pro
34.196.122.88  Malicious Activity! Public Scan

Submitted URL: https://mail.donotreply.biz/XaTE2a2ZnSFkyaWdoclhGOE05OXVvdEdYYXJ3U3I1QytuRjNlZFlWSUMvcklITm0wNzJkZnNJVWt6cW9PMXEvanoxeGJQdjJ...
Effective URL: https://login.strongencryption.org/pages/1581a70dc8a3722dd1e210b55bc10c0d/XaTE2a2ZnSFkyaWdoclhGOE05OXVvdEdYYXJ3U3I1QytuRjNlZFlWSUMv...
Submission: On November 07 via api from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

OOPS! YOU CLICKED ON A SIMULATED PHISHING TEST EMAIL.

What you need to do
 * Hover over the red flags below to learn how to recognize suspicious emails.
 * Check your inbox for an email from Safe With Me
   (safe.with.me@uhg.com). You'll have seven days to complete the KnowBe4
   training course.

FROM: MICROSOFT <NOREPLY@ACCOUNT-MICROSOFT365.COM>
REPLY-TO:  MICROSOFT <NOREPLY.IN5VN@867.EMPLOYEEPORTAL.NET-LOGIN.COM>
SUBJECT:  SETTINGS EXPIRE TODAY


CR2258397424


CR2258397424


PASSWORD SYSTEM REMINDER

THE PASSWORD FOR BARANA@WELLMED.NET IS SET TO EXPIRE TODAY, NOVEMBER 06, 2024.

WE RECOMMEND THAT YOU USE THE BELOW TO KEEP PASWORD VALID TO AVOID LOGIN
INTERRUPTION.

KEEP MY ACCESS ACTIVE

--------------------------------------------------------------------------------

TO UNSUBSCRIBE OR CHANGE WHERE YOU RECEIVE NOTICES, CLICK HERE.

REGARDS,
THE MICROSOFT TEAM


CR2258397424

PLEASE NOTE: THIS MESSAGE CAME FROM UNITEDHEALTH GROUP (UHG) AND NOT FROM THE
COMPANY WHOSE NAME IS MENTIONED IN THE BODY OF THE EMAIL MESSAGE, AS THE COMPANY
HAS NO ASSOCIATION WITH UHG. THE PURPOSE OF THIS MESSAGE IS TO DEMONSTRATE HOW
PHISHING ATTACKS CAN COME IN EMAILS THAT DECEPTIVELY APPEAR TO BE FROM REPUTABLE
COMPANIES. USE OF ALL THIRD-PARTY TRADEMARKS AND INTELLECTUAL PROPERTY IS SOLELY
FOR ILLUSTRATIVE AND INSTRUCTIONAL PURPOSES, AND IS NOT INTENDED TO SUGGEST
AFFILIATION, ENDORSEMENT OR SPONSORSHIP BY ANY THIRD-PARTY.