midpack.airfrance.fr
Open in
urlscan Pro
193.57.218.45
Public Scan
Submitted URL: http://dbox4klm.org/#/home/e284c392-b424-435e-bac5-8105d2bc2caa/4c8d2e94-444b-4a07-8cf6-67c49f762c5d
Effective URL: https://midpack.airfrance.fr/phishingvictim/en/pageStandard/PhishingVictim.html
Submission: On November 24 via manual from NL — Scanned from FR
Effective URL: https://midpack.airfrance.fr/phishingvictim/en/pageStandard/PhishingVictim.html
Submission: On November 24 via manual from NL — Scanned from FR
Form analysis
0 forms found in the DOMText Content
FR / EN Toggle navigation A+ YOU HAVE CLICKED ON A LINK THAT COULD HAVE BEEN MALICIOUS... ... IF IT WASN'T FOR THE AFKL PHISHING CAMPAIGN WHAT SHOULD HAVE CAUGHT YOUR ATTENTION? External email address (≠ @airfrance.fr / @klm.com) The suspiciousness of the link (redirect to an unknow website) The urgency of the message (It urges you to act quickly) Wording of the message (misspell, grammatical error) But what is phishing exactly? Sending fake emails to encourage the recipient to click on a link or open an attachment. The objective is to activate malware to infect the computer and steal confidential data. Phishing is the third most common tactic used by cybercriminals. More information "Phishing, it doesn't just happen to others" We believe that a person concerned is more likely to adopt good IT security practices. This is why we have chosen to raise your awareness through an internal phishing campaign.