www.domainte.com Open in urlscan Pro
52.208.238.135  Public Scan

Submitted URL: http://www.domainte.com/049fa25e718db0c1?l=115
Effective URL: http://www.domainte.com/load_training?guid=079fa259218db008&correlation_id=5153f0e2-1d64-479d-b548-8787fd122e7f
Submission: On November 23 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

POST http://brexit.breaking-news-now.net/training/acceptance

<form action="http://brexit.breaking-news-now.net/training/acceptance" method="post">&nbsp;</form>

Text Content

 


OH NO! YOU TOOK THE BAIT!


Just because someone says they work at Intel doesn't mean they do. A phony job
connection profile makes a great phishing lure. We're all curious about
potentially helpful or important work connections, that's why fake ones can be
used to get you to click. Pause before you click on messages like this,
attackers will use your interests and concerns to trick you into clicking a
malicious link.

This was a fake social media logo, but attackers use real ones like LinkedIn and
Facebook, with their logos and style, making them even harder to spot. Here’s an
example of a phish pretending to be from LinkedIn based on real-world attacks:


Don't worry, this was an approved phishing simulation run by Intel.
Help secure Intel, report phish using the PhishAlarm button in Outlook. Now on
Mac too!
Learn more at goto/reportphish.

 

 

One of the most effective means of spotting a phish is to look at the link that
the message is asking you to click.

Below, we show the link you would see by hovering your mouse over it (or
click-hold on your phone). Looks suspicious, right?