Attack Settings

The Attack Settings tab lets you attach a default or pre-configured attack template to your campaign.


Add an Attack Template to your campaign

Select "New Scenario"

This displays the Attack Template Gallery.

Use filters to find the correct attack template. For guidance on navigating the Attack Template Gallery, see our related article.

Search for your desired Attack Template, select "Use Template," and specify the default language.

You can dynamically preview templates. For further instructions, see our reference article.


Attack Template Base Settings

The base settings of the attack template provide an opportunity to define key parameters regarding the template's behavior.

Template

By default, the original template name will be populated as a direct link to the template location on your server.

Name Provide a suitable name for your attack scenario in the context of this campaign.

Click "Save" to commit your changes.


Mail Settings

Administrators have two choices for setting up mail delivery: globally or at the campaign level. Global settings affect all campaigns but can be overridden by campaign-specific settings, which only apply to the selected campaign. This flexibility allows for customized mail delivery preferences on a per-campaign basis:

Navigate to -> Settings -> Common System Settings -> Mail Settings Here you can choose your default method for sending emails. This setting will apply to all campaigns.


SSL Settings

Lucy features SSL automation that connects to GoDaddy via API to generate wildcard SSL certificates with 90-day validity in just seconds.

What is SSL?

SSL (Secure Sockets Layer) is like a protective shield. It ensures that when your targets interact with the awareness page, their data remains secure and can't be intercepted by prying eyes. It's the trusty guard that makes sure your training stays securely encrypted over the internet. Without an SSL certificate, your recipients will encounter a big red warning page, signaling that the site they're trying to access isn't secure. This could seriously affect the authenticity of your training if it's not properly set up. So, think of SSL as your trusty sidekick, keeping things legitimate, secure and encrypted.

Select the checkbox to include an "SSL Certificate"

Choose this option if you have already generated an SSL certificate on your Lucy server. This option allows you to reuse the existing certificate.

Be advised that the validity period of the existing certificates will not be extended.

See our platform reference article "SSL Settings" for more information.


Bound Awareness Scenarios

Lucy enhances the effectiveness of educational campaigns by allowing for a targeted approach, focusing on individual user performance across different simulated attack scenarios. This personalized method not only makes the training more relevant but also more engaging for users.

Scenario-Based Training Customization:

  • Specific Attack Recognition: Consider a campaign that includes various types of phishing attacks such as data entry, hyperlink, and file download attacks. Lucy allows you to monitor how each user responds to these different scenarios.

  • Customized Learning Experiences: If a user fails in one scenario but performs well in others, Lucy enables you to tailor the training specifically to their needs. For example, a user who mistakenly downloads malware thinking it is a legitimate document does not necessarily need a broad phishing course. Instead, they can benefit from a focused session on identifying and avoiding file-based threats.

  • Efficient and Effective Training: By providing training specific to the user's vulnerabilities, Lucy ensures that the learning is both efficient and directly applicable. This targeted education approach helps in reinforcing the correct practices without overloading the user with unnecessary information.

Configuration

Bound Awareness Scenarios can only be configured directly on the Awareness Scenario. In your current campaign, navigate to Configuration -> Awareness Settings -> Select your Awareness Scenario, then navigate to the tab "Bound Attack Scenarios":

Here, you can specifically link each awareness scenario with the corresponding attack simulation that aligns with the training material.

This capability allows you to provide targeted and efficient awareness training that addresses users' specific needs based on their performance in different attack scenarios.


Landing Page Template

The "Landing Page Template" tab in Lucy is a powerful tool for creating and managing phishing simulation landing pages.

Configuring Your Landing Page

Restore the template to its default settings before editing.

  • Language Selection: Choose the language for your landing page from the dropdown menu to ensure it matches the target audience's language.

Languages are not automatically translated; all adaptations must be applied to each selected language.

  • Editor Type: Select the type of editor you prefer to use. The default setting is the "Visual Editor", which provides a user-friendly interface for designing web pages.

Editing Content

Lucy's Attack templates will always include two files, index.html and account.html.

Lucy adheres to a strict naming convention for these files. If you create a custom template, make sure to name the files index.html and account.html.

Index.html

  • Purpose: Serves as the initial landing page for the simulated attack. When users click a link in the attack email, they are directed to this page.

  • Function: Mainly used for credential harvesting, this page typically prompts users to enter login details or other personal information.

Account.html

  • Post-Attack Redirection: After data is submitted on index.html, users are redirected to account.html.

  • Function: This page facilitates the conclusion of the attack. It may:

    • Automatically redirect users to the associated awareness training in the campaign.

    • Display a fake notification, such as "Your VPN was successfully authenticated."

    • Show a blank page that redirects immediately to awareness training with no delay, following the data exploitation on index.html.

The first page the user accesses should be named index.html.

Content Editing:

Use the editor toolbar to add or modify text, insert images, and adjust formatting.

Landing page Variables
  1. %static% — Path to the static directory, useful for referencing CSS/JS files from the HTML page. For example:

    htmlCopy code<link rel="stylesheet" type="text/css" href="%static%/style.css">
    <script src="%static%/script.js"></script>
  2. %link% — Base link of the scenario, used in navigation for constructing absolute URLs.

  3. %name% — Recipient's full name.

  4. %firstname% — Recipient's first name.

  5. %lastname% — Recipient's last name.

  6. %email% — Recipient's email address.

  7. %link-awareness% — Link to the awareness website. Ensure the awareness website is configured and enabled in campaign settings.

  8. %division%, %location%, %staff-type%, %comment% — Information related to the recipient.

  9. %gender("MALE ADDRESSING", "FEMALE ADDRESSING", "NO GENDER")% — Customizable addressing based on the recipient's gender.

  10. %subject% — Subject of the phishing mail.

  11. %sender% — Sender's name of the phishing mail.

  12. %sender-email% — Email address of the phishing mail sender.

  13. %time(FORMAT, OFFSET, ZONE)% — Time-based variables:

    • FORMAT - Date/time format.

    • OFFSET - Date/time offset in minutes; can be negative (e.g., "-60" means 60 minutes before mail submission time, "20160" means 14 days after).

    • ZONE - Time zone name (e.g., US/Central).

    • Example: %time("l, H:i", "0", "Europe/Zurich")% will output "Monday, 09:20" — the exact time of email submission in the Europe/Zurich time zone.

    • Example: %time("Y/m/d H:i:s", "60")% will output "2016/12/12 10:20:30" — 1 hour ahead of email submission time.

Please note that these variables are not available in CSS and JavaScript files.

Incorporate dynamic elements:

Login forms

Downloadable content

"Trojan Download: is only available for file-based and mixed attacks.

Editing Account.html

account.html can be seen as the conclusion to a successful attack initiated through index.html. This page can serve various purposes; by default, it acts as a confirmation of the attack with messages like "Error Occurred attempting to set the password."

Leaving the user on this page without further action could prompt them to contact the IT team, potentially creating an unnecessary bottleneck. To avoid this, Lucy allows you to insert a redirect and specify the delay in milliseconds before the redirect takes effect.

The redirect places a script in the source code with a default redirect time of 5000 milliseconds.

You can change the redirect time by adjusting the millisecond value to eg. 2sec -> 2000

Finally, you need to specify the destination for the redirect. For instance, you might want to direct the user to your internal Learning Management System (LMS); in this case, you can add a fully qualified domain name.

Alternatively, you can use the 'awareness' placeholder variable to redirect the user to the associated awareness training in the campaign.

Editing a template within a campaign should be campaign-specific, indicating that the modifications are exclusive to that campaign and not intended for reuse in future campaigns.

Preview and Adjustments

  • Preview: Utilize the "Preview" button to view how the landing page looks in real-time, allowing for adjustments before deployment.

Finalizing the Landing Page

  • Save Changes: Always remember to save your changes to ensure all modifications are updated and stored correctly.

  • Restore Defaults: If needed, you can restore the settings to their default state at any stage.


Message Template

This is your opportunity to customize the default email template to match your organization's branding, font, and voice.

Setting Up the Email

Choose the language from the "Language" dropdown, e.g., English.

Languages are not automatically translated; all adaptations must be applied to each selected language.

Email Details

  • Fill in the "Subject" field, e.g., "Your password expired!".

  • Enter "Sender Name", e.g., "Discord Notifications".

  • Provide "Sender Email", e.g., "no-reply@discword.com".

It's advisable to use a sender domain that is associated with the registered domain of the attack since this domain's DNS records (SPF, MX) are automatically configured to point to your Lucy server. This alignment helps ensure that the emails appear more legitimate and reduces the risk of them being flagged as spam.

Content Editor

Choose "Editor Type" from the dropdown to select your preferred email editor.

The Visual Editor is a WYSIWYG interface, offering an easy way for users to create content as it will appear in its final form. With a straightforward toolbar, users can format text and add multimedia without coding knowledge.

Composing the Email

Use the "Content" section for email composition.

Format text with the toolbar options (bold, italic, underline, etc.).

Insert dynamic variables into the content.

Dynamic Variables Explained

When creating email templates, you can personalize the content by using various placeholders that will be automatically replaced with specific user data when the email is sent. Below is an explanation of each variable available for use in the templates:

  • %link%: This variable represents the base URL of your site. Use it to construct absolute URLs for navigation within your emails.

  • %user-password-reset%: This placeholder is replaced with the unique URL for a password reset action.

  • %user-profile-link%: Inserts a direct link to the user's profile page in the End User Portal.

  • %user-login-url%: Provides a link to the End User Portal that utilizes SSO (OAuth 2.0) for login.

  • %name%: The full name of the email recipient.

  • %firstname%: The recipient's first name.

  • %lastname%: The recipient's last name.

  • %email%: The recipient's email address.

  • %client%: The name of the client associated with the recipient.

  • %gender("MALE ADDRESSING", "FEMALE ADDRESSING", "NO GENDER")%: This is a conditional variable that changes the greeting or addressing based on the recipient's gender.

  • %subject%: The subject line of the phishing email.

  • %sender%: The name of the sender of the phishing email.

  • %sender-email%: The email address from which the phishing email is sent.

  • %started%: The date when the related phishing campaign was started.

  • %stopped%: The date when the related phishing campaign was stopped.

  • %time(FORMAT, OFFSET, ZONE)%: A dynamic time variable where:

    • FORMAT refers to the format in which the date/time should be displayed.

    • OFFSET is the time offset from the mail send time, which can be positive or negative.

    • ZONE is the time zone to be applied.

    • Example: %time("l, H:i", "0", "Europe/Zurich")% would display the time of the email submission in the Europe/Zurich time zone.

    • Example: %time("Y/m/d H:i:s", "60")% would show a timestamp one hour ahead of the email submission time.

Note that these variables are intended for use in the HTML body of the email and are not applicable within CSS and Javascript files. They serve to customize the email content for each recipient and should be used accordingly to ensure a personalized user experience.

"Upload File or Image" to add company branding or assets.

Add your own attachments. Keep in mind that most common email clients filter certain types of attachments, like executables, to prevent malware risks.


Last updated