open.microsoftsql.net Open in urlscan Pro
54.146.200.68  Public Scan

Submitted URL: https://open.microsoftsql.net/086ce4e344c671aa?l=104
Effective URL: https://open.microsoftsql.net/load_training?guid=356ce4ed64c6717d&correlation_id=a8a2394c-9379-4c7f-87b9-6db2b4554d3b
Submission: On November 18 via manual from SG — Scanned from SG

Form analysis 1 forms found in the DOM

POST /training/acceptance

<form action="/training/acceptance" id="training-form" method="post">
  <div style="text-align: center;"><input class="ack_button sm" data-text="acknowledge" type="submit" value="I Understand!"></div>
</form>

Text Content

 
Oops!  You just opened a fake phish link, but don’t worry!  You have clicked a
link in a simulated phishing email sent by BD Information Security.  Read
the Teachable Moment below and click the Acknowledge button when done.

You have been phished!
This was a test — BD Information Security (IS) is working to increase
cybersecurity awareness and have crafted the Teachable Moment below to help you
understand how to identify suspicious emails.

These were the signs
 * Beware of email coming from external sources.  EXTERNAL EMAIL - Use caution
   opening attachments and links. In this particular case the email was sent
   from:Shared File <sharrpoint101@microsoftsql.net>
 * The email provides  Open Contract link to click on  and asked users to input
   their User ID and Password. Do caution about the URL before clicking where
   it belongs to microsoftsql.net . There is no such Microsoft Sharepoint site
   as microsoftsql.net

What's next?
 * Please fill this form and provide us with feedback 
 * Report suspicious emails with a single click using Outlook's Report
   Suspicious button.
 * Improve your phish-email-detection skills by visiting our Maxwell education
   and training page.



Questions? Please contact IS at InfoSec@bd.com.

Click the below button to confirm you acknowledge the learning. Thank you.