Attack Templates

Add an Attack Template

Select + New Scenario to view the template gallery.

Search for an Attack template, select Use Template, and specify the default language.

You can dynamically preview templates. For further instructions, see our reference article.


Base Settings

The base settings of the attack template provide an opportunity to define key parameters regarding the template's behavior.

Template

You can change the attack template at any time by clicking the edit button on the right.

Name

Give the attack simulation a name. This will show up in the campaign report.

Domain

Configure a domain (and an optional subdomain) for the attack simulation.

You can select a URL-shortening service from the dropdown menu. This feature is available only for domain names, not IPs.


Mail Settings

Administrators have two choices for setting up mail delivery: globally or at the campaign level. Global settings affect all campaigns but can be overridden by campaign-specific settings, which only apply to the selected campaign. This flexibility allows for customized mail delivery preferences on a per-campaign basis:

Navigate to -> Settings -> Common System Settings -> Mail Settings Here you can choose your default method for sending emails. This setting will apply to all campaigns.


SSL Settings

Select the checkbox to include an SSL Certificate:

Choose this option if you have already generated an SSL certificate on your Lucy server. This option allows you to reuse the existing certificate.

Be advised that the validity period of the existing certificates will not be extended.


Bound Awareness Scenarios

Lucy enhances the effectiveness of educational campaigns by allowing for a targeted approach, focusing on individual user performance across different simulated attack scenarios. This personalized method not only makes the training more relevant but also more engaging for users.

Scenario-Based Training Customization:

  • Specific Attack Recognition: Consider a campaign that includes various types of phishing attacks such as data entry, hyperlink, and file download attacks. Lucy allows you to monitor how each user responds to these different scenarios.

  • Customized Learning Experiences: If a user fails in one scenario but performs well in others, Lucy enables you to tailor the training specifically to their needs. For example, a user who mistakenly downloads malware thinking it is a legitimate document does not necessarily need a broad phishing course. Instead, they can benefit from a focused session on identifying and avoiding file-based threats.

  • Efficient and Effective Training: By providing training specific to the user's vulnerabilities, Lucy ensures that the learning is both efficient and directly applicable. This targeted education approach helps in reinforcing the correct practices without overloading the user with unnecessary information.

Configuration

Bound Awareness Scenarios can only be configured directly on the Awareness Scenario. In your current campaign, navigate to Configuration -> Awareness Settings -> Select your Awareness Scenario, then navigate to the tab "Bound Attack Scenarios":

Here, you can specifically link each awareness scenario with the corresponding attack simulation that aligns with the training material.

This capability allows you to provide targeted and efficient awareness training that addresses users' specific needs based on their performance in different attack scenarios.


Landing Page Template

The "Landing Page Template" tab in Lucy is a powerful tool for creating and managing phishing simulation landing pages.

See our guide for attack template customization here.

Lucy's attackt emplates will always include two files, index.html and account.html:

Lucy adheres to a strict naming convention for these files. If you create a custom template, make sure to name the files index.html and account.html.

Index.html

  • Purpose: Serves as the initial landing page for the simulated attack. When users click a link in the attack email, they are directed to this page.

  • Function: Mainly used for credential harvesting, this page typically prompts users to enter login details or other personal information.

Account.html

  • Post-Attack Redirection: After data is submitted on index.html, users are redirected to account.html.

  • Function: This page facilitates the conclusion of the attack. It may:

    • Automatically redirect users to the associated awareness training in the campaign.

    • Display a fake notification, such as "Your VPN was successfully authenticated."

    • Show a blank page that redirects immediately to awareness training with no delay, following the data exploitation on index.html.

Preview the landing page

Select the Preview button to view how the landing page looks in real-time, allowing for adjustments before deployment.


Message Template

Setting Up the Email

Subject

The subject line of the email.

Sender Name

The name of the sender. This can be anything you want.

Sender Email

The email address of the sender. This does not need to be an existing email address, but the domain does need to point to your Lucy server. For best results, use the same domain as your awareness website.

It's advisable to use a sender domain that is associated with the registered domain of the attack since this domain's DNS records (SPF, MX) are automatically configured to point to your Lucy server. This alignment helps ensure that the emails appear more legitimate and reduces the risk of them being flagged as spam.

Content

Choose "Editor Type" from the dropdown to select your preferred email editor.

The Visual Editor is a WYSIWYG interface, offering an easy way for users to create content as it will appear in its final form. With a straightforward toolbar, users can format text and add multimedia without coding knowledge.

Email Variables

When creating email templates, you can personalize the content by using various placeholders that will be automatically replaced with specific user data when the email is sent. Below is an explanation of each variable available for use in the templates:

  • %link%: This variable represents the base URL of your site. Use it to construct absolute URLs for navigation within your emails.

  • %user-password-reset%: This placeholder is replaced with the unique URL for a password reset action.

  • %user-profile-link%: Inserts a direct link to the user's profile page in the End User Portal.

  • %user-login-url%: Provides a link to the End User Portal that utilizes SSO (OAuth 2.0) for login.

  • %name%: The full name of the email recipient.

  • %firstname%: The recipient's first name.

  • %lastname%: The recipient's last name.

  • %email%: The recipient's email address.

  • %client%: The name of the client associated with the recipient.

  • %gender("MALE ADDRESSING", "FEMALE ADDRESSING", "NO GENDER")%: This is a conditional variable that changes the greeting or addressing based on the recipient's gender.

  • %subject%: The subject line of the phishing email.

  • %sender%: The name of the sender of the phishing email.

  • %sender-email%: The email address from which the phishing email is sent.

  • %started%: The date when the related phishing campaign was started.

  • %stopped%: The date when the related phishing campaign was stopped.

  • %time(FORMAT, OFFSET, ZONE)%: A dynamic time variable where:

    • FORMAT refers to the format in which the date/time should be displayed.

    • OFFSET is the time offset from the mail send time, which can be positive or negative.

    • ZONE is the time zone to be applied.

    • Example: %time("l, H:i", "0", "Europe/Zurich")% would display the time of the email submission in the Europe/Zurich time zone.

    • Example: %time("Y/m/d H:i:s", "60")% would show a timestamp one hour ahead of the email submission time.

Note that these variables are intended for use in the HTML body of the email and are not applicable within CSS and Javascript files. They serve to customize the email content for each recipient and should be used accordingly to ensure a personalized user experience.

Add your own attachments. Keep in mind that most common email clients filter certain types of attachments, like executables, to prevent malware risks.

Last updated

Was this helpful?