s.securefinancial.eu
Open in
urlscan Pro
100.24.100.138
Malicious Activity!
Public Scan
URL:
http://s.securefinancial.eu/1U34=privacysecuredasdwe53d/32a826/3d0d5597-7efd-43b9-9f44-cab0537670c7/
Submission: On March 16 via manual from US — Scanned from DE
Submission: On March 16 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Joseph Carr ip to Main Content English English US * English English US No results found THIS WAS AN AUTHORIZED PHISHING SIMULATION If you ever suspect an email to be a phishing attack, or have any questions or feedback related to this exercise, please email Information_Security_Awareness@navyfederal.org. WARNING SIGNS OF A PHISH The email you just received was a simulated phishing email. Had that been the real thing, your computer and our network might have been at risk. Think twice before clicking hyperlinks, downloading attachments, or submitting information when solicited via email. Please take a minute to review the email again and observe the warning signs you might have missed. Hover over the highlighted words to reveal additional information and/or press the play button to watch the animation of all the clues one by one. Instructions for customizing the email mockup: The email mockup below contains three areas highlighted in yellow. These highlighted areas are "clues" that indicate the email is a potential phish. When recipients who view this education hover over or tap a clue, they will see descriptive text that explains the clue in more detail. You can customize the email mockup so that its contents, clues, and clue descriptions match the email you are sending as part of your scenario. To customize the email mockup: 1. Save any changes you have made so far to the education. 2. In the email mockup below, change the From address, the subject line, and the email body to match the contents of this scenario's email. You can copy the subject line and email body from the Email tab. (For best results, type the From address manually.) 3. In the email body, click and drag the portion that you want to define as a clue (for example, the From email address, the subject line, or a specific phrase in the email body). Then, from the Styles list in the editor, select Marker: Yellow to highlight the clue in yellow. 4. In the "Type the text for your clue descriptions below" box beneath the email, type the clue description. 5. Repeat these steps for each clue you want to highlight. (NOTE: The editor matches clues with clue descriptions in the order they appear in the mockup regardless of the order in which you defined the clues. That is, the first clue description you provided is matched with the first clue that appears in the mockup, the second clue description is matched with the second clue in the mockup, and so on.) 6. Save your changes, preview the education, and send yourself a test message to make sure the education looks and functions as intended. * File * * Message * * Help * J Joseph Carr <joseph.carr@securefinancial.eu> [External] Property for Sale Hello, We came across your website and contact details online and we would like you to help us sell our property. Please find details of the property by following the link below and we look forward to hearing from you. https://edoc-transfer.com/property-details Details provided includes a folder containing the following 1. Details of each property and the selling price 2. Report of the recent inspection carried out on the properties 3. Valuation of the properties Please consider the details provided and contact us if you are interested in the sale. Kind regards, Joseph Carr Head of Acquisition e: joseph.carr@securefinancial.eu w: https://www.phiscientificholdings.com Phishing Education: Warning Signs of a Phish Type the text for your clue descriptions below. 1. Clue 1: Do you recognize this sender? 2. Clue 2: Did you notice this was from an external email? 3. Clue 3: Did you notice this email was not even addressed to you or NFCU? 4. Clue 4:Is this the normal process for Real Estate sales? 5. Clue 5: Hovering over links is not an accurate way of detecting real Phishing emails and could result in accidental clicks. 6. Clue 6: Did you notice that the sending email domain and the website name did not match? If you suspect that you have received a spear phishing email at work, follow our procedures for reporting it immediately. HOW DO I REPORT EMAILS? Previously, reporting potential phishing emails could be a confusing process. Now, all that is needed to report an email is one click of the Reporter button in your inbox; with Reporter. Once you have reported the email, we will immediately notify you that your report has been submitted. LEARN MORE PHISHING IS THE LEADING CAUSE OF DATA BREACHES. All it takes is one click to compromise our network. As the number of cyber attacks targeting our industry continues to increase, it is important to be aware of the latest threats. WHAT IS SPEAR PHISHING? Spear phishing emails are sent to small groups or individuals to target our organization. Attacks are personalized to increase the perception that the email is legitimate and to bypass technical controls like spam filters. Additionally, phishing emails play on emotions like fear, curiosity, recognition, opportunity, and a sense of urgency. POPULAR NARRATIVES IN PHISHING EMAILS INCLUDE: * Closing documents or contracts (DocuSign is often spoofed) * List of new properties * Customer leads * New homebuyer inquiry * Payment issues Some of the most common threats impacting our industry include Business Email Compromise (BEC)—or CEO fraud—ransomware, and malware like Banking Trojans. BUSINESS EMAIL COMPROMISE (BEC) Phishers have stolen millions of dollars by impersonating vendors or executives and requesting a wire transfer. The real estate industry is heavily targeted with BEC phishing emails. From 2015 to 2017, there was a 1100% rise in the number of BEC victims reporting the real estate transaction narrative and a 2200% rise in reported monetary loss. RANSOMWARE Ransomware is a type of malware that encrypts your files and prevents you from accessing them until you pay a fee. If infected, all personal and company information on our network may be compromised, and files will be inaccessible. BANKING TROJANS Banking Trojans seek information—especially online account credentials—to gain access to financial accounts. Attackers seek real estate targets with significant holdings in bank accounts. REMEMBER, YOU ARE THE LAST LINE OF DEFENSE AGAINST PHISHING. If you receive a suspicious email, report it immediately. ©Cofense Phishing Education: Warning Signs of a Phish