Your company is participating in a Cyber Security Education Program.
This Copilot Activation Phishing Attack included the following social engineering techniques:
- Spoofed email and domain (example: activate-copilot@locked-outlook.com).
- Urgency to act (example: Log in to activate [your Copilot Enterprise account]).
- Simple clean email to minimize suspicion.
- Link to allow you take action attacker wants.
- Copilot logo inserted into email to appear legitimate.
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- The sender named email address was not associated with Copilot.
- Example: activate-copilot@locked-outlook.com: locked-outlook.com is primary domain and not associated with Copilot.
- The link provided used suspicious domain similar to above.
