• tiramichu@sh.itjust.works
    link
    fedilink
    arrow-up
    164
    ·
    1 day ago

    A previous (huge) company of mine sent out a lot of phishing test emails, some of which were pretty convincing.

    As developers, we quickly discovered that all the emails had a metadata header in them which identified them as a phishing test, so we set up a filter for it so every email since is clearly coded with a bright red “Phishing test!” label.

    • brbposting@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      6 hours ago

      Assuming that’s disabled -

      experienced folks can get caught (e.g. maybe waking up before dawn or something)

      Can be a good reminder, a little humbling!

    • Honytawk@feddit.nl
      link
      fedilink
      arrow-up
      1
      ·
      5 hours ago

      Did it also label real phishing mails?

      Because those tests are send out for a reason. And in my experience, developers are some of the worst at cybersecurity.

    • Ephera@lemmy.ml
      link
      fedilink
      English
      arrow-up
      14
      ·
      20 hours ago

      Here they started doing such phishing tests a while ago and our IT department had significantly worse stats than other departments, in terms of how often we would click on the link in the phishing mail.

      And yeah, the conclusion was that we were just being asshats that decided to poke around in the obvious phishing mails for the fun of it. Rather than getting extra security training, management told us to just stop dicking around, so that our stats look better.

    • toynbee@lemmy.world
      link
      fedilink
      arrow-up
      71
      ·
      1 day ago

      … You must be one of my co-workers. Except that we just delete ours rather than labeling them.

      • tiramichu@sh.itjust.works
        link
        fedilink
        arrow-up
        79
        ·
        edit-2
        1 day ago

        We needed to label them because the requirement was not only that we don’t click them, but that we use the “report phishing” function on them.

        Also some of them were pretty funny.

        • ViatorOmnium@piefed.social
          link
          fedilink
          English
          arrow-up
          9
          ·
          1 day ago

          Was it hoxhunt? It’s a bit spammy but they seem to push for a more gamefied approach over collective punishment.

          • tiramichu@sh.itjust.works
            link
            fedilink
            arrow-up
            18
            ·
            1 day ago

            Not in my case, no. The content was completely custom to the organisation. I assume they were big enough that they felt like a lot of the risk would come from coordinated spearphishing carefully crafted to look like genuine corp email.

        • toynbee@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          1 day ago

          In my case, the phishing tests originated with the organization that owns my employer, rather than within my employer itself. Our email states are entirely distinct so, while we can report the emails, no one would ever care.

    • Dave@lemmy.nz
      link
      fedilink
      arrow-up
      14
      ·
      1 day ago

      Where I work they use the microsoft phishing simulation, for which they publish a list of domains they send from.