Your company is participating in a Cyber Security Education Program.
This Disk Full Phishing Attack included the following social engineering techniques:
- Spoofed email and domain (example: <your-company>.co).
- Urgency to act.
- Use of your email to customize the email.
- Simple clean email to minimize suspicion.
- Link/Button to allow you take action attacker wants.
- Verbiage to catch attention (example: Limit Reached).
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- Did this email come from someone from IT you know?
- You should reach out to IT if in doubt.
- The sender named email address was not associated with your company.
- Example: spoofing your company domain may have been used.
- The link provided used suspicious domain similar to above.