Your company is participating in a Cyber Security Education Program.


This DHL Phishing Attack included the following social engineering techniques:


  1. DHL and Amazon to be consistent with current emails as most people have purchased from Amazon and are familiar with DHL Express.
  2. DHL logo to appear legitimate.
  3. Links and email masked with dhl-now.com to appear correct.
  4. Company name used in "lure" email (social proofing).
  5. Commitment & consistency through "lure" & "phishing" email pair.


How to spot this was a phishing email:


  1. Was this an email you expected to receive? No - Be cautious
  2. The sender named email address was suspicious (not from the correct address): example - do-not-reply@dhl-now.com
  3. See Note below
  4. The link provided (if checked/mouse hover) was directing to http://notice.dhl-now.com/...
  5. See Note below


Note: DHL is not associated with dhl-now.com (primary domain)


“An employee is either an asset to your cyber security or a risk.”