• OneCardboardBox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Happened at my workplace. An phishing email went out to test how likely people were to click the link.

    Anyone who clicked the link had to take phishing training. Anyone who forwarded it to our internal “hey this is a phishing email” service also had to take training… because the internal service would automatically click the link.

      • doctordevice@lemm.ee
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        1 year ago

        Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?

        I’ve worked a help desk before, while after dozens of people sending it in we don’t really need it forwarded anymore, people don’t know that until we get the I’d still rather people forward it than click it. Ignore and delete is best since I guarantee someone will forward it to IT, but forwarding (even forwarding and asking) is never bad and demonstrates good awareness.

        • jcg@halubilo.social
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?

          The URL likely is unique per user. They forward it, IT clicks the link, it registers that that user clicked the link even though IT did it.

        • railsdev@programming.dev
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          1 year ago

          Random but what I always wonder is: what’s the point of forwarding?

          Are we assuming they’re attaching the original email’s source so that the headers can be used to determine the source? Without that, the only thing useful I can think of would be any links in the email body.

          Asking because I’ve owned an email address or two that got leaked in data dumps so I go crazy tracking down the sending server’s owner, any companies they’re pretending to be, any domain registrars, etc. and a lot of that requires analyzing the headers.