We found out that 10% of our users entered their password.

  • @Vinny_93
    link
    924 days ago

    They haven’t fooled me yet. They’re actually fairly easy to spot.

    • clif
      link
      324 days ago

      The last round my company did was pretty damn good. The email itself was well done and professional looking. They even registered a domain that was one letter different than the company name for the source email domain and the phishing form.

      It was still one of those things that makes you hesitate like “your password has expired, click here to reset it” and the email client blatantly flagged it as being from outside our true domain. The client warning was the easy thing to spot, the rest was really well done.

      • @APassenger
        link
        4
        edit-2
        24 days ago

        That’s the odd thing with where I work, until recently all the phishing simulations were from within the company domain and so lacked the [External…]

        It’s not impossible for an already infiltrated network, but I still expect to see that it came from outside. Maybe that’s me, tho.

        Wdits: spullings <- like those

        • clif
          link
          124 days ago

          Wow, that is impressively sneaky to use the legitimate domain.