Your company is participating in a Cyber Security Education Program.
This Copilot Activation Phishing Attack included the following social engineering techniques:
- Spoofed email and domain (example: no-reply@locked-outlook.com).
- Topical subject matter as AI tool use is becoming more common for businesses.
- Simple clean email to minimize suspicion.
- Link to allow you take action attacker wants.
- Copilot logo inserted into email to appear legitimate.
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- The sender email address was not associated with Copilot.
- Example: no-reply@locked-outlook.com: locked-outlook.com is primary domain and not associated with Copilot.
- The link provided used suspicious domain similar to above.
