Your company is participating in a Cyber Security Education Program.
This Social Media Policy Phishing Attack included the following social engineering techniques:
- Spoofed email name (example: on behalf of <executive>).
- Urgency to act ("Accept Terms").
- Simple clean email to minimize suspicion.
- Link to allow you take action attacker wants ("Social Media Policy").
How to spot this was a phishing email:
- Was this an email you expected to receive? No - Be cautious
- Did this email (address) come from someone from management you know?
- You should reach out to management if in doubt.
- The sender named email address was not associated with your company.
- Example: social@<domain.com> not associated with your company.
- The link provided used suspicious domain similar to above.