s.securefinancial.eu Open in urlscan Pro
100.24.100.138  Malicious Activity! Public Scan

URL: http://s.securefinancial.eu/1U34=privacysecuredasdwe53d/32a826/3d0d5597-7efd-43b9-9f44-cab0537670c7/
Submission: On March 16 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Joseph Carr ip to Main Content
English English US
 * English English US

No results found



THIS WAS AN AUTHORIZED PHISHING SIMULATION

If you ever suspect an email to be a phishing attack, or have any questions or
feedback related to this exercise, please email
Information_Security_Awareness@navyfederal.org.




WARNING SIGNS OF A PHISH

The email you just received was a simulated phishing email. Had that been the
real thing, your computer and our network might have been at risk. Think twice
before clicking hyperlinks, downloading attachments, or submitting information
when solicited via email. Please take a minute to review the email again and
observe the warning signs you might have missed.

Hover over the highlighted words to reveal additional information and/or press
the play button to watch the animation of all the clues one by one.

Instructions for customizing the email mockup:

The email mockup below contains three areas highlighted in yellow. These
highlighted areas are "clues" that indicate the email is a potential phish. When
recipients who view this education hover over or tap a clue, they will see
descriptive text that explains the clue in more detail. You can customize the
email mockup so that its contents, clues, and clue descriptions match the email
you are sending as part of your scenario.

To customize the email mockup:

 1. Save any changes you have made so far to the education.
 2. In the email mockup below, change the From address, the subject line, and
    the email body to match the contents of this scenario's email. You can copy
    the subject line and email body from the Email tab. (For best results, type
    the From address manually.)
 3. In the email body, click and drag the portion that you want to define as a
    clue (for example, the From email address, the subject line, or a specific
    phrase in the email body). Then, from the Styles list in the editor, select
    Marker: Yellow to highlight the clue in yellow.
 4. In the "Type the text for your clue descriptions below" box beneath the
    email, type the clue description.
 5. Repeat these steps for each clue you want to highlight. (NOTE: The editor
    matches clues with clue descriptions in the order they appear in the mockup
    regardless of the order in which you defined the clues. That is, the first
    clue description you provided is matched with the first clue that appears in
    the mockup, the second clue description is matched with the second clue in
    the mockup, and so on.)
 6. Save your changes, preview the education, and send yourself a test message
    to make sure the education looks and functions as intended.

 

 * File
 *  
 * Message
 *  
 * Help
 *  

J

Joseph Carr <joseph.carr@securefinancial.eu>
[External] Property for Sale

Hello,

We came across your website and contact details online and we would like you to
help us sell our property.
Please find details of the property by following the link below and we look
forward to hearing from you.

https://edoc-transfer.com/property-details

Details provided includes a folder containing the following
 1. Details of each property and the selling price
 2. Report of the recent inspection carried out on the properties
 3. Valuation of the properties


Please consider the details provided and contact us if you are interested in the
sale.

Kind regards,

Joseph Carr
Head of Acquisition
e: joseph.carr@securefinancial.eu
w: https://www.phiscientificholdings.com

Phishing Education: Warning Signs of a Phish



 

 

  

Type the text for your clue descriptions below.

 1. Clue 1: Do you recognize this sender?
 2. Clue 2: Did you notice this was from an external email? 
 3. Clue 3: Did you notice this email was not even addressed to you or NFCU?
 4. Clue 4:Is this the normal process for Real Estate sales?
 5. Clue 5: Hovering over links is not an accurate way of detecting real
    Phishing emails and could result in accidental clicks.
 6. Clue 6: Did you notice that the sending email domain and the website name
    did not match?

If you suspect that you have received a spear phishing email at work, follow our
procedures for reporting it immediately.
 


HOW DO I REPORT EMAILS?

Previously, reporting potential phishing emails could be a confusing process.
Now, all that is needed to report an email is one click of the Reporter button
in your inbox; with Reporter. Once you have reported the email, we will
immediately notify you that your report has been submitted.

  

 


LEARN MORE


PHISHING IS THE LEADING CAUSE OF DATA BREACHES.

All it takes is one click to compromise our network.

         

As the number of cyber attacks targeting our industry continues to increase, it
is important to be aware of the latest threats.

WHAT IS SPEAR PHISHING?

Spear phishing emails are sent to small groups or individuals to target our
organization. Attacks are personalized to increase the perception that the email
is legitimate and to bypass technical controls like spam filters. Additionally,
phishing emails play on emotions like fear, curiosity, recognition, opportunity,
and a sense of urgency.

POPULAR NARRATIVES IN PHISHING EMAILS INCLUDE:

 * Closing documents or contracts (DocuSign is often spoofed)
 * List of new properties
 * Customer leads
 * New homebuyer inquiry
 * Payment issues

 

Some of the most common threats impacting our industry include Business Email
Compromise (BEC)—or CEO fraud—ransomware, and malware like Banking Trojans.

BUSINESS EMAIL COMPROMISE (BEC)

Phishers have stolen millions of dollars by impersonating vendors or executives
and requesting a wire transfer. The real estate industry is heavily targeted
with BEC phishing emails. From 2015 to 2017, there was a 1100% rise in the
number of BEC victims reporting the real estate transaction narrative and a
2200% rise in reported monetary loss.

RANSOMWARE

Ransomware is a type of malware that encrypts your files and prevents you from
accessing them until you pay a fee. If infected, all personal and company
information on our network may be compromised, and files will be inaccessible.

BANKING TROJANS

Banking Trojans seek information—especially online account credentials—to gain
access to financial accounts. Attackers seek real estate targets with
significant holdings in bank accounts.
 


 


REMEMBER, YOU ARE THE LAST LINE OF DEFENSE AGAINST PHISHING.

If you receive a suspicious email, report it immediately.

©Cofense

Phishing Education: Warning Signs of a Phish