www.domainte.com
Open in
urlscan Pro
52.208.238.135
Public Scan
Submitted URL: http://www.domainte.com/049fa25e718db0c1?l=115
Effective URL: http://www.domainte.com/load_training?guid=079fa259218db008&correlation_id=5153f0e2-1d64-479d-b548-8787fd122e7f
Submission: On November 23 via manual from IN — Scanned from DE
Effective URL: http://www.domainte.com/load_training?guid=079fa259218db008&correlation_id=5153f0e2-1d64-479d-b548-8787fd122e7f
Submission: On November 23 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMPOST http://brexit.breaking-news-now.net/training/acceptance
<form action="http://brexit.breaking-news-now.net/training/acceptance" method="post"> </form>
Text Content
OH NO! YOU TOOK THE BAIT! Just because someone says they work at Intel doesn't mean they do. A phony job connection profile makes a great phishing lure. We're all curious about potentially helpful or important work connections, that's why fake ones can be used to get you to click. Pause before you click on messages like this, attackers will use your interests and concerns to trick you into clicking a malicious link. This was a fake social media logo, but attackers use real ones like LinkedIn and Facebook, with their logos and style, making them even harder to spot. Here’s an example of a phish pretending to be from LinkedIn based on real-world attacks: Don't worry, this was an approved phishing simulation run by Intel. Help secure Intel, report phish using the PhishAlarm button in Outlook. Now on Mac too! Learn more at goto/reportphish. One of the most effective means of spotting a phish is to look at the link that the message is asking you to click. Below, we show the link you would see by hovering your mouse over it (or click-hold on your phone). Looks suspicious, right?