Your company is participating in a Cyber Security Education Program.
This DHL Phishing Attack included the following social engineering techniques:
- DHL and Amazon to be consistent with current emails as most people have purchased from Amazon and are familiar with DHL Express.
- DHL logo to appear legitimate.
- Links and email masked with dhl-now.com to appear correct.
- Company name used in "lure" email (social proofing).
- Commitment & consistency through "lure" & "phishing" email pair.
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- The sender named email address was suspicious (not from the correct address): example - do-not-reply@dhl-now.com
- See Note below
- The link provided (if checked/mouse hover) was directing to http://notice.dhl-now.com/...
- See Note below