login.gov-services.com Open in urlscan Pro
34.233.78.98  Public Scan

Submitted URL: https://login.gov-services.com/d919095806ba5656?l=11
Effective URL: https://login.gov-services.com/load_training?guid=7219095ac6ba560e&correlation_id=b4f249b5-c0a7-497b-a0a2-09a086f6f974
Submission: On February 08 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://login.gov-services.com/training/acceptance?correlation_id=b4f249b5-c0a7-497b-a0a2-09a086f6f974

<form action="https://login.gov-services.com/training/acceptance?correlation_id=b4f249b5-c0a7-497b-a0a2-09a086f6f974" id="training-form" method="post"><button class="button" data-text="ack" type="submit">Acknowledge</button></form>

Text Content

YOU'VE BEEN PHISHED

Don't close your browser and don't worry, this is an authorized simulation by
UMMS. We're going to show you what phishing is, and how to stay "off the hook".




At the bottom of this web page there is an "Acknowledge" button you need to
click to show us that you have completed the training.


HERE'S HOW PHISHING WORKS:

 * 1
   
   First, the attacker picks users to target at various levels within the
   organization. Anyone from top executives and their staff, systems
   administrators, customer service representatives, HR, and accounting can be a
   target. Even you.

 * 2
   
   Then the attacker sends you an email that attempts to get you to take an
   action such as clicking on a link, opening an attachment, or logging into a
   fake web site.

 * 3
   
   When you click on the attacker's malicious link or open a malicious
   attachment, your computer is infected with malicious software called malware.

 * 4
   
   The malware gives the attacker access into your computer where the attacker
   can read your email, access files on your hard drive and the network, and
   attack other users or systems on the network -- all from your computer!

 * 5
   
   Once the attacker has gathered all of the data he or she needs, they zip it
   up, and upload it from your computer out to the Internet.

Phishing is a very serious problem as attacks are increasing in frequency.

However through on-going user training, we can equip you with the knowledge to
spot phishing emails and stay "off the hook".




ASK YOURSELF THE FOLLOWING QUESTIONS THE NEXT TIME YOU RECEIVE A SUSPICIOUS
EMAIL:

 * Do you really know who is sending you the email?
 * Do you recognize the sender and their email address?
 * Is the tone consistent with what you would expect from the sender?
 * Is the sender asking you to open an attachment or access a website?
 * Is the sender threatening that you may lose access to your account?

If you receive a suspicious email, use the Suspicious Email Report button to
send it in for analysis!

By clicking “Acknowledge” below you agree that you have read the training
material.

Acknowledge

This phishing simulation was provided by your employer and may contain logos
from unaffiliated companies. Please only contact your employer regarding this
message. Confidential and Proprietary - Privacy Policy