Your company is participating in a Cyber Security Education Program.
This Outlook Limit Phishing Attack included the following social engineering techniques:
- Spoofed email and domain (example: locked-outlook.com).
- A product which you use in your workflow.
- Urgency to act.
- Use of your email to customize the email.
- Simple clean email to minimize suspicion.
- Link/Button to allow you take action attacker wants.
- Verbiage to catch attention (example: Limit Reached, Full).
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- Did this email come from someone from IT you know?
- You should reach out to IT if in doubt.
- The sender named email address was not associated with Microsoft or Outlook.
- Brining up browser and typing in domain used isn't valid (example: limit@locked-outlook.com).
- The link provided used suspicious domain similar to above.