Please create a new campaign by pressing the button “New –> Campaign”.
Every campaign has some “Basic Settings” which do not relate to a specific scenario template. Those basic settings can be found at a later point in the according menu to the left:
The following settings can be configured:
|1||Campaign Name: Give your campaign a name. This name will be displayed on the main dashboard.||Yes||Monitor a campaign|
|2||Client: Create a client or choose the built-in client (a client can be your own organization or the company who asked you to perform a phishing test). This is important because you can also create view only accounts which are associated with those clients.||Yes||Create a Client|
|3||Setup Mode: As you are using the expert setup, please make sure you also selected “expert setup mode in this menu. You have different setup options like the Expert Setup, the Setup Wizard or a Start with predefined campaign Template (called sample campaign in LUCY < 3.0).||Yes||-|
|4||Industry: Please select the industry type for the organisation. This is an optional setting. It will allow Benchmarks||No||-|
|5||Notes: Internal notes for you or other campaign admins||No||-|
|6||End User Profiles: Users might not have time to finish an awareness course right away. They have the ability to re-schedule the training (see this WIKI). But you have also the ability to create a login page for your end users where they can login and access their custom training links at any time, without the need to re-send an awareness mail.||No||End User Profile Page|
|7||Track responses: For accurate statistics, Lucy has the functionality to work with emails that came in response to a phishing email. Thus, you can determine which of the recipients did not actually receive the e-mail(for example email was not delivered and Lucy received a response from the mail server) or do not include the auto-responses in the statistics.||No||Track responses|
|8||E-Mail Tracking: You may use this feature to track if a campaign is functional and working as expected (e.g if mails arrive, the landing page works as expected etc.). With this feature, the system will periodically send emails to a test address, while the campaign is running. That will help you to make sure that the attack is executing correctly||No||E-Mail Tracking|
|9||Antivirus / Firewall Protection: Sometimes a remote Firewall, Spam filter or Virus Filter might automatically scan all the URL's within a link. As a result you end up with false positives and LUCY will show all link clicked (success). To avoid such automatic link requests by some 3rd party application you can enable the antivirus/firewall protection and LUCY will ignore all* GET requests for the first 30 or 60 seconds||No||Firewall Protection|
|10||Awareness Re-Scheduling: The recipient will be able to re-schedule an awareness training. He/She will be able to define a new time/date. On that specified date/time the system will re-send the awareness email||No||Link|
|11||Ignore Repeated Answers in Awareness: If you added an awareness training, you may specify that only the first answer to an exam or quiz gets recorded and repeated answers will be ignored||No||-|
|12||Stop the campaign automatically: if enabled, the campaign will stop on the specified date. No more E-mails will be sent out. Campaigns with landingpages won't be accessible anymore||No||Start/Stop a campaign|
|13||Send a report when you stop the campaign: if enabled, the system will send you a report automatically. Please make sure you configured the according report template||No||Create a report template|
|14||Pinned: “Pinned campaigns” are used to group different campaigns within a view, similar to browser favorites. As soon as you have activated the checkbox “pinned” within the campaign, the campaign will appear on the dashboard within the according frame.||No||Pinned Campaigns|
|14||Delete protection: The system will keep a backup of the campaign in the system. If the campaign accidentally gets deleted, the support team will be able to restore it.||No||-|
Now you need to select one or multiple scenarios. A scenario can be:
For a) & b): Please go to Base Settings and then click the “Add Scenario” button at top right
If you want to do a training only campaign, please search for “blanc” in the search field and select the “blanc awareness template” as a placeholder for your awareness scenarios.
More info on a) in this chapter. You are able to preview every template before selecting it. In the Preview Mode you can test the site using all the features (just enter some random login to get to the next page).
STEP 5: For this tutorial, as an example, we select the “Encrypted Email Scenario”, where the user will be asked to login with their Windows username and password to access an encrypted email message.
Once you have selected the scenario, you need to configure the Base Settings of this template. So every template has its own unique settings (mail delivery method, domain, ssl etc.). You could for example send an attack simulation X using the built-in mail server and an attack simulation Y using an external mail relay. You find the settings of each scenario if you click on the left navigation item under “Base settings” (the general campaign settings) and then at the bottom of the according settings in the scenario:
Once you opened the specific scenario editing menu, please navigate toe “scenario settings” to get back to this page at a later point:
Here is a list of configuration items in this menu:
|1||Scenario Name: First, give your scenario a name. This could be the name of the attack for example (like “social-media-hyperlink-attack”||Yes||-|
|2||Domain: Choose how your recipients will be able to access the webpage by defining the Domain. This domain does NOT relate to the email domain from where you send the attack simulations. It only refers to the landing page (the domain of the page that appears when users click the link). Finding the appropriate domain name is a very important step for the success and it depends very much on your campaign scenario. If you plan to create a fake web mail login you could reserve a domain like “webmail-server365.com” and point it to LUCY.||Yes||-|
|3||Sub Domain: If you selected a domain, you can now specify the subdomain. Lets say your main domain is cloudservices.com and you want to spoof your own company called “spoofy”. The subdomain you could enter in this field could be “spoofy”. The link to the attack simulation page then would be spoofy.cloudservices.com||No||-|
|4||Track Opened Emails: Inserts an invisible image into outgoing emails to track if users opened the message. Use this feature carefully as some email servers may put such emails into the Spam Folder. Also, some email clients (like Outlook) block the automatic downloading of images in the Preview window.||No||Tracking|
|5||Send Link to Awareness Website Automatically: Send a link to the Awareness Website after a user has been successfully attacked. Please note that the Awareness Website should be published for this feature to work. You dont need to send the user an email for the training. You could also redirect the user to the trainings page directly within the attack scenario||No||Redirect user to the training|
|6||Advanced Information Gathering*: Enable this option to enable advanced information gathering on the user who accesses your attack simulation.||No||Advanced Information Gathering|
|7||Success Action: Defines what LUCY considers as a successful attack. There are 4 options. Those success action define at what point the elearning should be started. If you choose “data entry”, the elearning would only be started once the user enters some data on a landing page. So if you use “data entry” as a success action on a file based template without a login, the elearning will never be sent to the user!||Yes||Success Actions|
|8||Collect Data: Choose “Full” if you want to record all entered logins and passwords, “Partial” to record only the first 3 letters (remaining letters will be masked with asterisks) or “No” to skip user data collection.||Yes||Do not transmit data|
|9||Double Barrel Attack: When using Double Barrel Attack, the system first sends a “Lure” email containing some teaser text. After that, the system waits for a while (you can configure that time in settings below) and sends an actual phishing email. The “Lure” delay defines, in seconds, the time frame between the Lure and the attack emails for a Double-Barrel Attack.||No||-|
|10||URL Shorting: When you place the %link% variable within the message body and your scenario uses a public domain name, it will automatically be shortened. The link will look like “http://is.gd/9VjDKF” to fit into one text message. If you use an IP address for your landing page the link will be not shortened.||No||URL Shortener|
|11||Login Regex: Another option is to define some login filters to only catch valid logins (you could define the Domain Name in the User Name field or say that the Password has to be at least 8 characters to be accepted from LUCY).||No||More Info|
Once you saved the base scenario settings, a new menu for this specific scenario will appear to the left:
It allows you to configure more options. Some of them are part of the next chapter. Two should be listed here
After saving the Base Settings, you can now Edit the Landing Page, Upload Your Own Webpage or simply copy any website on the internet. The Landing Page is the webpage that the users will see when they click on the link in the email they receive. First, select the drop-down menu at the top the page where you want to edit. Please note that the same landing page may be available in different languages. So make sure you edit the correct language.
Note: If you edit a Landing Page which is based on a pre-defined scenario template in a campaign, it won't affect the default scenario templates. Only if you go into Settings/Scenario templates and start editing the templates outside the campaign will all changes be stored permanently to this specific scenario.
Let’s assume that you want to replace the logo on the Landing Page: Just double click on the existing logo (1). Select your own image (2), upload it (3) and save the changes by clicking “OK”.
It’s time to setup email communication (if you want you can also use SMS as an alternative).
Please make sure the link variable is set in the HTML code, if you hide it behind another Link. If you type a hyperlink instead of a word, the editor will automatically detect that, and create the link in the code. But this link will be wrong: If you type http://www.example.com in the editor, LUCY will automatically create a hyperlink to http://www.example.com in the HTML code (1) and underline the URL. But if you want http://www.example.com pointing to your LUCY URL, please remove the link pointing to http://www.example.com in the source code directly, or remove it by clicking on the “unlink” symbol (2), and then select the text “http://www.example.com” and click on the link symbol again and insert %link% in the HTML code (3).
For all other settings please read the Mail Settings Chapter.
You need to create the Recipients List in the Menu item “Recipients”.
This is the list of users that will get the phishing emails. You can add them manually, import a file with all your recipients, import them via LDAP or even search them on the internet. Once you have created that group, you can select it in your campaign and map them to a specific scenario. You can also define if they should be used only for the Landing Page link, the Awareness site link (e-learning) or both.
Please read the Recipients Settings Chapter for more configuration options.
If you want, you can create a schedule to run the campaign using a delay or customized time delays between campaign phases. If you are new to the system, we'd recommend that you go with the Default Timing Settings and skip this step. Please read the Schedule Settings Chapter for more configuration options.
You have the ability to provide the user with some awareness training in case he fails the phishing simulation. A failure to pass the phishing simulation is considered as a successful attack in LUCY. Therefore, it is very important that you define what you consider as an successful attack (because only those who have been successfully tested, will receive an awareness training). The awareness training can be done in two ways:
Now you are ready to start. Although we recommend performing a test run with a single recipient before you start attacking all users, additionally it is a good idea to use the LUCY SPAM Checker. Just click “Real Attack” and LUCY will test your settings before starting the campaign. If you want to skip the checks, press “Skip Checks”. Your first recipients should receive the emails within seconds. Please read the Start Campaign Settings Page for more configuration options. If you experience any problems with starting/running your campaign, please Consult the Troubleshoot Section first.
The progress of the campaign can always be monitored in Real-Time. Click “Statistics” within your campaign. Please read the Statistics Chapter for more configuration options.
Once you have finished the campaign, you may either export the raw data (CSV/TXT export) or create different types of reports (PDF, HTML, DOX or raw export). Please read the Creating Reports Chapter for more configuration options.
If you experience problems with your campaign please use this WIKI with the free text search option or contact us under support (at) lucysecurity.com