Your company is participating in a Cyber Security Education Program.


This Copilot Activation Phishing Attack included the following social engineering techniques:


  1. Spoofed email and domain (example: no-reply@locked-outlook.com).
  2. Topical subject matter as AI tool use is becoming more common for businesses.
  3. Simple clean email to minimize suspicion.
  4. Link to allow you take action attacker wants.
  5. Copilot logo inserted into email to appear legitimate.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. The sender email address was not associated with Copilot.
  3. Example: no-reply@locked-outlook.com: locked-outlook.com is primary domain and not associated with Copilot.
  4. The link provided used suspicious domain similar to above.


“An employee is either an asset to your cyber security or a risk.”