Security Awareness Simulation

You Were Just Phished.

This was a controlled test — no real data was captured. But in a real attack, things would be very different. Let's learn why this matters.

What just happened to you?

Here's how this simulated phishing attack unfolded — and how a real attack would work.

Attacker crafts fake email Your Inbox email looks real You Clicked on a malicious link Account at Risk credentials stolen Step 1 Step 2 Step 3 Step 4
1

A convincing email arrived in your inbox

Phishing emails are designed to mimic trusted senders — banks, employers, IT departments, or popular services. They create a sense of urgency to stop you from thinking clearly.

2

You clicked the link without verifying it

The link appeared legitimate but pointed to a fake website. Real phishing URLs often mimic trusted domains with subtle typos or extra subdomains.

3

A fake login page captured your credentials

Fake pages are pixel-perfect copies of real ones. Any details you enter go directly to the attacker — not to the legitimate service.

4

The attacker now controls your account

With your credentials, attackers can lock you out, access sensitive data, impersonate you, and launch further attacks on your contacts.

Phishing red flags to watch for

Train your eye to spot these patterns in every email you receive.

Suspicious sender address

The display name may say "Apple Support" but the actual email address looks nothing like apple.com. Always expand the sender field.

Urgency and threats

"Act within 24 hours or your account will be deleted." Pressure tactics are designed to override your rational thinking.

Unexpected links or buttons

Hover over any link before clicking. If the destination URL looks odd, don't click. Go directly to the website instead.

Generic greetings

"Dear Customer" or "Dear User" — legitimate companies know your name and personalise their communications.

Requests for credentials

No legitimate company will ask for your password, PIN, or security codes via email. Ever. Full stop.

Too-good-to-be-true offers

Prize notifications, tax refunds, or package delivery alerts you weren't expecting are common lures to get you to click.

Your phishing prevention checklist

Build these habits to protect yourself — and your organisation — every day.