Your company is participating in a Cyber Security Education Program.


This Copilot Activation Phishing Attack included the following social engineering techniques:


  1. Spoofed email and domain (example: activate-copilot@locked-outlook.com).
  2. Urgency to act (example: Log in to activate [your Copilot Enterprise account]).
  3. Simple clean email to minimize suspicion.
  4. Link to allow you take action attacker wants.
  5. Copilot logo inserted into email to appear legitimate.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. The sender named email address was not associated with Copilot.
  3. Example: activate-copilot@locked-outlook.com: locked-outlook.com is primary domain and not associated with Copilot.
  4. The link provided used suspicious domain similar to above.


“An employee is either an asset to your cyber security or a risk.”