target.netbenefits-access.com Open in urlscan Pro
54.91.49.254  Malicious Activity! Public Scan

Submitted URL: https://target.netbenefits-access.com/015e979c4e09da35?l=29
Effective URL: https://target.netbenefits-access.com/load_training?guid=0a5e97995e09dab7&correlation_id=6aa4d5bc-4370-453f-8ffb-5a5e40f5ec13
Submission: On October 10 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://target.netbenefits-access.com/training/acceptance?correlation_id=6aa4d5bc-4370-453f-8ffb-5a5e40f5ec13

<form action="https://target.netbenefits-access.com/training/acceptance?correlation_id=6aa4d5bc-4370-453f-8ffb-5a5e40f5ec13" id="training-form" method="post">
  <div style="text-align: center; margin-top: 20px;"><input class="myButton" data-text="acknowledge" type="submit" value="Got it! Thanks!"></div>
</form>

Text Content

 

Don't Worry!

This was a simulated phishing email sent from
The Information Security Management Office

 

Had this been a real link-based cyber attack, you would have been phished. 

 
To help you learn to detect and avoid future phishing messages, you will be
receiving awareness training in the next 48 hours.
It will be a short module, packed with important information to help you learn
to protect yourself from cyber threats.
 
This type of phish is known as a Link Based Attack.
The hacker tricked you into clicking the malicious link.

Here are some signs to watch out for in real phishing messages:  
Always check for grammatical and spelling errors. Most legitimate sites do not
have typos.

Hover over the link to see the URL destination. Does it match up with a
legitimate site?

 

Be aware of the tone of the email. Most phishing messages  triggers an emotional
response that gets you to act fast.
Skip the link! Always verify the destination by going directly to the URL
advertised in the message. 
For questions about this phishing simulation, email ismotraining@snhu.edu
 

Click to acknowledge and close