scb.securitytraining.io
Open in
urlscan Pro
34.197.1.197
Public Scan
Submitted URL: https://clicktime.symantec.com/15tpDLwAR2BQ3Ai5Y6jWE?h=Aaj37QYpp-Lhd25O8lcGp3zUYKXJgXXtyph7LI5d_Hs=&u=http://www.mail-subsystem...
Effective URL: https://scb.securitytraining.io/training?a=iY7i47e_jRA&t=PlBbbhLtEBpCW0ZSSWE1z3mVa1Q
Submission: On December 19 via manual from IN — Scanned from DE
Effective URL: https://scb.securitytraining.io/training?a=iY7i47e_jRA&t=PlBbbhLtEBpCW0ZSSWE1z3mVa1Q
Submission: On December 19 via manual from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
You've clicked on a link in a phishing simulation email Luckily, this was only a simulated attack. Had this been a real phishing email, by clicking on the link, your device or the Bank's network could have been infected with malware, leading to our information being stolen or systems being disrupted, and potentially causing reputational damage and financial losses. Every single one of us is responsible for helping to tackle the phishing threat. Spotting and reporting suspicious emails doesn’t just protect you…it protects our clients, your fellow colleagues and helps us build a strong risk culture (as applied to ICS) across the Bank. Additional support in identifying suspicious emails There were a number of red flags to indicate that the email was phishing. Below, highlighted in red, are the key indicators: 1. External source notification within the subject title and red external email banner 2. The email is sent from a suspicious and unknown domain 3. Use of threatening language 4. The hyperlinked text leads to an unfamiliar URL Whenever you are in doubt remember: Standard Chartered Bank | People Security | ICS