this post was submitted on 29 Mar 2025
976 points (98.9% liked)

iiiiiiitttttttttttt

764 readers
415 users here now

you know the computer thing is it plugged in?

founded 2 years ago
MODERATORS
 
(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 21 points 1 week ago (1 children)

Companies are damned if they do and damned if they don't. All the best security on the world will never prevent an attack from the universally weakest link - humans.

Best you can do is identify the humans that are likely to fall for it and remind them to be extra careful when clicking links in emails.

[–] [email protected] 5 points 1 week ago (1 children)

Better is to design your security so that if a human does click a dodgy link the compromise is limited as much as absolutely possible

load more comments (1 replies)
[–] [email protected] 19 points 1 week ago

We also have anti fishing campaigns in our company and usually I do pretty well with those, but last year because of a running event they sent a mail out in regards to free T-shirts for the event. Most of the company including me failed gloriously.

[–] [email protected] 10 points 1 week ago

This likely had several warning signs that can be used for even personal emails. 1) is it too good to be true? Definitely in this example. Give me a gas card physically and I might believe it. 2) look at the actual link before you click. If it's not part of the main domain for the company you're expecting, or not within the intranet at work, it's an automatic nope. 3) any oddities in the message or images that seem wrong. Misspellings, pixelated logos, etc. This is the smallest red flag, as often times getting a perfect email without any grammar or spelling issues means it didn't come from a manager, that seems to be a requirement.

[–] [email protected] 5 points 1 week ago (1 children)

I think this story may be told by an unreliable narrator.

We have no evidence that the email actually came from their job - that misidentification by Ki might be the problem that IT hopes training will solve.

[–] [email protected] 13 points 1 week ago* (last edited 1 week ago)

When a company sends fake phishing attempts, the links report back if they've been clicked. For them to get that report, their job would had to have sent it.

How else would they know she fell for the bait unless she actually did get phished months ago and their IT traced a recent attack back to her, in which they gave her training instead of firing her?

The immediacy of the follow up email indicates she was caught my a fake phishing attempt meant to catch employees before real attackers do.

load more comments
view more: ‹ prev next ›