www.eservce.net
Open in
urlscan Pro
52.17.216.100
Public Scan
URL:
https://www.eservce.net/load_training?guid=de63865e88da96b6&correlation_id=878135f9-0f5b-45ce-84a4-1b97399cf275
Submission: On May 07 via manual from US — Scanned from DE
Submission: On May 07 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://www.eservce.net/training/acceptance?correlation_id=878135f9-0f5b-45ce-84a4-1b97399cf275
<form action="https://www.eservce.net/training/acceptance?correlation_id=878135f9-0f5b-45ce-84a4-1b97399cf275" id="training-form" method="POST"><button class="action classname" type="submit"></button>
<div class="i icon-checkmark"> </div>
<button class="action classname" type="submit"><span data-text="ack">Acknowledge Exercise</span></button>
</form>
Text Content
STOP! YOU'VE BEEN PHISHED BUT DON'T CLOSE THIS PAGE! Please read through the following information and click the “Acknowledge” button when complete To view your performance on previous Firmwide tests, you can visit http://mysimphishing (This is only available in Morgan Stanley network) THIS WAS AN AUTHORIZED PHISHING SIMULATION BY MORGAN STANLEY. HOWEVER, THIS COULD HAVE BEEN SENT BY A CRIMINAL & CLICKING THE LINK COULD HAVE... Gained access to your email Gained access to your hard drive and all your files Used your PC to gain access to Morgan Stanley's network ...and damaged our reputation NEXT TIME YOU MAY NOT BE SO LUCKY Please take 5 minutes to read the following info on how to detect and avoid phishing attacks. What is Phishing? Phishing is an attempt, usually through email, to gather personal information or to compromise technology for the purpose of financial gain or malicious activities. Phishing emails typically include a link to a fraudulent site or an attachment containing malware. You are the last line of defence against this threat Why is Phishing a risk? Fraudsters and criminals can... Steal Information Steal Identity Install Malicious Software Attack your Contacts Which in turn can cause Reputational Damage Service Disruption Significant Monetary Loss Is Phishing really a threat? Hackers gained access to the username and passwords for employees who were in charge of maintaining Sony's systems after hackers sent a phishing email to Sony employees. The hackers used the access to leak multiple movies prior to their release date, leak damaging internal emails, and leak the confidential information of 47,000 Sony employees. THE FINAL COST OF THE BREACH IS REPORTED TO BE AT LEAST $100 MILLION USD. In 2011, RSA (The largest provider of secure remote access tokens) was targeted. A phishing email was received by 4 RSA employees and it was identified as junk mail by the SPAM filters however 1 user retrieved the email and opened the attachment. The attachment downloaded a malicious excel spreadsheet which allowed hackers to take control of the employees computer and access RSA's critical systems. ONE EMPLOYEE LOST RSA OVER $80 MILLION How do I Identify Phishing? With careful observation you may find some of these common warning flags... Please hold your mouse over the red boxes in the email below to view some of the warning signs. Don't trust the From: field - it can be spoofed! Sometimes phishing messages even spoof the To: field. Does it look suspicious? Phishing messages sometimes contain misspellings. Hover your mouse over the URL, does the link look familiar? Does the message contain a threat? Does the overall wording and "voice" seem a bit off? TAKE ACTION * 1. Don't Click * 2. REPORT the Email using standard process * - For Morgan Stanley (non-integrated companies), use "Spam Report" or "PhishAlarm" button on your Outlook toolbar or forward to spambutton@morganstanley.com if using a mobile device. * - For E*TRADE, forward to #phishingalert * - For Eaton Vance, use PhishAlarm button * - For MSSC, forward to IT_security@morganstanley.com.cn * 3. DELETE THE MESSAGE DON'T BE AN EASY TARGET. TAKE RESPONSIBILITY TO PROTECT Morgan Stanley DATA. If in doubt, don't click By clicking the button below you acknowledge that you have completed the phishing exercise. Acknowledge Exercise This phishing simulation was provided by your employer and may contain logos from unaffiliated companies. Please only contact your employer regarding this message. Confidential and Proprietary - Privacy Policy