LUCY comes with a "Phish Alert" plugin/addon for mail clients or browsers:
This add-in gives your users a safe way to forward suspected Emails with only one click and have them analyzed automatically by the threat analyzer in LUCY. The tool empowers users to proactively participate in an organization’s security program and makes it easy for your employees to report any suspicious email they receive. It has two main features
a) Forward the mail (.msg) to a predefined mail address (e.g. your security team). Within the plugin you have the ability to define a custom message that appears to the user after the mail gets reported. Once the message gets forwarded to your team, it will automatically be deleted from the user's inbox to prevent future exposure. b) Report back to LUCY: the plugin may forward suspected phishing emails as well LUCY generated emails back to the LUCY server via HTTPS. If the mail was generated by LUCY, the reports will automatically be processed within the campaign statistics. All other emails can be analyzed in LUCY using our threat analysis engine.
The configuration of the plugin and phishing incidents is done within the settings menu (Admin/Settings/Incident Settings) where you can define the settings for:
You can make multiple configurations and use them for different customers or organizational units. Please create a configuration, save it and download the corresponding plugin. You can repeat this step as often as you like for other organizations.
Plugin settings: The following settings can be configured (this is a small selection; every LUCY release has its own settings. Please contact us for a full configuration tutorial):
|Setting Name||Description||Outlook (MSI)||Office365 (XML)||Gmail|
|Default Language||Set the default language for the plugin.||+||+||+|
| the mail address of your security team. This is the address, where suspected phishing mail gets forwarded. The whole mail will be attached as a .msg and send to a predefined mail address. You may use multiple emails separated by a semicolon symbol (;). |
|Outlook MSI Icon (ico)||Choose an icon for visual representation of plugin's button in the Outlook MSI interface. Once it has been picked up there is a preview and an option to delete icon.||+||-||-|
|Outlook O365 Icon (png)||Choose an icon for visual representation of plugin's button in the Office365 Outlook interface. Once it has been picked up there is a preview and an option to delete icon.||-||+||-|
|Send Reports Over HTTP||Enable this option, if you want the Outlook Plugin to send a copy of the reported phishing mail to LUCY (does not include emails from phishing simulations) and additionally add the statistical info about reported phishing emails to LUCY.||+||+||+|
|Never report phishing simulations||No reports will be sent over HTTP if user reports a simulation email generated by Lucy. So the plugin will send only "real phishing" emails over HTTP.||+||+||-|
|Send Reports over SMTP||Enable this option, if you want to forward the mail to the predefined mail address via SMTP. If enabled, the plugin will send the report to the email you provided on the same page. That is supposed to be your own email or the email of your security team. Please do not use this method at the same time with HTTP to send reports to LUCY, if you do not want to have duplicated reports. Only pick one delivery method.||+||+||+|
|Use SMTP for receiving incident reports on Lucy||if enabled, Lucy will suppose it has to intercept emails that plugin sends over SMTP, so it configures the local postfix accordingly. All emails received will be added to incidents. If you do not enable this, even if the email configured points to Lucy, nothing will happen - Lucy won't wait for reports over SMTP. This option requires that the first e-mail in the "Email" field should be the e-mail of Lucy postfix server||+||+||+|
|Never report phishing simulations||No reports will be sent over SMTP if user reports a simulation email generated by Lucy. So the plugin will send only "real phishing" emails over SMTP. If HTTP is disabled as well, Lucy will not get these reports either, as there is no other delivery method configured for these reports.||+||+||+|
|Send phishing simulations over HTTP||If the option is enabled, the plugin will send reports regarding phishing simulations to LUCY via HTTP.||+||+||-|
|Use X-Headers in forwarded emails|| If true, the plugin will make the following changes in the email forwarded over SMTP:|
* Add a new header X-CI-Report: True
* Add a HTML code <p>X-CI-Report: True</p> after the body tag within the email body.
|Inline Message Forwarding||If true, the plugin will clear the body of the forwarded email when sending the report via SMTP.||+||-||-|
|Deeper Analysis Request||If true, the plugin will ask the user whether to request deeper analysis of the reported phishing mail.||+||+||-|
|Enable Comment to Deeper Analysis Request||If Deeper Analysis Request is true, the plugin will offer to the user an additional text box where the user can type any comment to the deeper analysis request. Additionally the user can configure a custom text that will appear instead of "Yes" or "NO" labels on the buttons||+||-||-|
|Send reported mail attachment in EML format||Reported email message will be sent as an *.eml attachment.||+||+||+|
|Disable Autoresponder For Reports||If true, LUCY will not send an automatic email to a user as a reaction to report.||+||+||+|
|Delete reported email||Set this action option and the plugin will delete the reported emails.||+||-||-|
|Move reported email to non-system folder named||Set this option and the plugin will move reported emails to the custom-named folder. Type in the folder name in the field below.||+||-||-|
|Move reported email to Junk E-mail of the current user||Set this action option and the plugin will move reported email to Junk E-mail of the current user.||+||-||-|
|Notify of Expired Incidents||Check this to receive notification if there are reports older than 30 days. This notification will be delivered via email.||+||+||+|
|Setting Name||Description||Outlook (MSI)||Office365 (XML)||Gmail|
|Language||Choose the language preset to configure it specifically for the needed language.||+||+||+|
|Thank you message||The message that will be displayed after the user marks a suspected phishing email and pushed the plugin button.||+||+||-|
|Thank you message for LUCY mails||The message that will be displayed for all emails, that are created by LUCY within a simulated phishing campaign.||+||+||-|
|Button Message||The name of the button in Outlook.||+||-||-|
|Button Super Tip||The help text displayed when the user hovers the mouse over the button.||+||-||-|
|Report Title||The title of the message that will be displayed after the user marks a suspected phishing email and clicks the plugin button.||+||+||-|
|Error Title||The title of the message that will be displayed when any error occurs.||+||+||-|
|User Request Message||The message that will be displayed after the user marks a suspected phishing email and clicks the plugin button.||+||+||-|
|Deeper Analysis Request Message||Deeper analysis request confirmation text. This message box is shown after user clicks on the report button.||+||+||-|
|No Selection Message||The title of the message that will be displayed after the user clicks phish button without any selected email.||+||-||-|
|Eval Error Message||Text displayed when the error of getting the selected item occurs.||+||-||-|
|Send Error Message||The message that will be displayed when an issue with sending the report occurs.||+||-||-|
|Unsupported Message||Text displayed when user tries to report an unsupported item (calendar event, etc).||+||-||-|
|Subject||The subject of the forwarded email message when sending a report over SMTP. You may use %subject% variable to insert the subject of the phishing email. Example: Phish Alert %subject%.||+||+||+|
|Ribbon Label||The name of the area in which the button is located.||+||-||-|
|For "Yes" action||Set the Deeper Analysis Request Custom Button for "Yes" action.||+||+||-|
|For "No" action||Set the Deeper Analysis Request Custom Button for "No" action.||+||+||-|
If you don't want any further notification, please set a status of the open tickets or disable the checkbox on LUCY:
The algorithm logic for the different delivery options in the plugin is as follows:
Once you configured the plugin in the LUCY UI and install it, you will notice that the settings can be viewed or changed locally. However in order to be able to change it, first turn on the settings in the Lucy's plugin settings as shown below:
Known Issues: if you use SMTP for receiving incident reports on Lucy within the incidents, Lucy will intercept all your emails to the domain specified. If you use example.com as a domain for receiving the incidents in LUCY, the internal Postfix server will be listening for this domain for incoming mails. If you now start at the same time a phishing or awareness campaign and try to send your emails to "@example.com", LUCY will not forward those emails externally.
The deployment can be done via MSI file which can be downloaded after the initial configuration under the "incidents" menu (/admin/incidents). You can create multiple configurations for different organisation units or clients. For this reason the download offers the possibility to choose the client first:
The assignment to the client can be used in the user interface to sort or filter incidents:
The plugin installer needs user to have read and write access at least to keys under HKCU (current user).
User Wide plugin will affect only one user of a particular PC. Machine Wide plugin will be available for every user of a PC once it is installed.
Upon installation, a temporary config.dat file is created. But all settings are written in the registry and can therefore be controlled via GPO. The plugin may be installed in the user context HKCU or in machine context (to HKLM.
The Outlook 365 button works the same as the Outlook client – just for the web-based Outlook access 365. For its work, it is necessary to have a network connection between LUCY and O365 server in case if you use a web browser as a client, and a network connection between LUCY and user's workstation in case if a desktop client is used. The XML is the file that needs to be installed for O365:
Outlook 365 sequence:
You can install the O365 plugin for multiple users in the Microsoft 365 admin center. Detailed instruction how to do it is available on the Microsoft website:
From Lucy version 4.7.8 phishing plugin can be utilized in the O365 Mobile version both on Android and iOS platforms. In order to make the plugin available for mobile applications simply install the XML plugin as described in the according to the section above. After the plugin is deployed for the web version it will automatically appear in the Outlook mobile application. Feel free to contact the support team if any issues occur.
It is also possible to deploy O365 XML into Exchange with compatibility mode, the report button will be available for Android & iOS as well.
Microsoft has "Office for Mac" product, which requires the O365 account to run. When you open Outlook application on Mac, it fetches all plugins from the corresponding O365 account and shows them in the interface, so the plugin is available both in the web interface and on Mac. Therefore, you first need to install the plugin in O365 before you set it up on a MAC.
Outlook 365 sequence:
The plugin automatically handles emails created in a phishing simulations from LUCY: it will ensure that only reports of potentially malicious emails are delivered to appropriate security staff. All emails created by LUCY itself will create a custom message to inform the user, that the mail has been send as a part of a security awareness program. LUCY generated phishing mails won't be forwarded to the security team. But they will be reported back to LUCY in order to process the information within the campaign statistics. The reported mails will then be purged from the successful attack listings in LUCY.
If a user spots the phishing simulation and reports the email, you can see this information in various places:
In LUCY 4.4, the incidents reports will also be integrated on the dashboard under the general statistics.
Once the mail has been reported by the user it will popup as an incident in LUCY in case you have enabled the HTTP option in LUCY. There are a few automatic analysis routines build into LUCY (e.g. check an IP in Google's Safe Browsing Database or Phishtank Database). More checks will follow in the upcoming versions.
LUCY will automatically flag mail simulations. All other mails can then be manually verified by the administrator. All mails can be downloaded as .msg or .eml file and/or add an incident report.
When you click on a reported mail you will first see the overall risk score. The overall risk score is a weighted average of the following score from different scans:
When a user forwards an email to LUCY all the domains and IP's from the mail header & body are extracted. For each IP and domain LUCY will then lookup public databases like google's safe browsing or phishtank, if any threat was reported:
The current sources are:
More sources will be added with each new major release. Lucy will query those sources directly from the location where the software is installed. No data is transmitted back to our infrastructure.
The LUCY admin can also quickly just manually investigate the WHOIS records from the IP's by clicking on the help symbol:
The reported emails can be categorized by status:
The threat mitigation allows a LUCY admin to report reported phishing mails to according abuse contact of the provider's originating IP address taken from the message header. You can click on the mail symbol within the incident center to initiate the sending of the report. More info here.
The e-mails reported to LUCY via plugin can be automatically forwarded to external systems (e.g. Splunk) via LUCY's REST API. This ensures a seamless connectivity to a SOC.
The plugin is a non signed MSI file and programmed as a C++/COM object. It is bundled with Microsoft Visual C++ 2015 Redistributable (x86) Package (14.0.23026). The loading time of the plugin is around 10 MS. It has been tested in Outlook 2010, 2013 & 2016. An Office365 Plugin is available with LUCY > 3.7.
A phishing mail generated in LUCY will have a "X-Lucy-VictimUrl" value in the mail Header. This allows LUCY to identify the phishing mail and Report it back to the app using a HTTPS call. Example:
X-Lucy-VictimUrl: https://microsoft.secure-log-in365.info/f56/phishing-report Message-Id: 20170414072426.390935E2095F@demo.phishing-test.services
If the user click the phish button where the HTTP delievery is configured in the Settings, a new click Event is generated. The variables could look like this:
url: https://demo.phishing-test.services/phishing-report email: firstname.lastname@example.org message: Thanks. Your help is appreciated! lucyMessage: This was a phishing simulation. Thank you for your help! buttonText: Phish Reporter submitHttp: yes submitSmtp: yes something is selected user clicked yes property accessor is ok submitting over smtp... successfully submitted over smtp submitting over http... url: https://microsoft.secure-log-in365.info/f56/phishing-report
HTTPS communication - plugin to LUCY: The XML always uses web browser to send data to Lucy. In case of running as a web-plugin in MS Outlook it uses the build-in web browser (for Windows it is Internet Explorer) to communicate with Lucy. Both, MSI and XML, use the proxy system settings (Windows > Control Panel > Network and Internet > Internet Options). If Windows-based authentication is required for the proxy, it will work transparently as well as for MSI and XML.
If you enable "send reports via SMTP" you cannot send emails to the same domain (e.g. "example.com") anymore: this setting will cause Lucy to intercept all your emails to "example.com" domain. If you remove the checkbox, then Lucy won't try to intercept emails for that domain and the feature will work as expected. Using "Send Reports Over SMTP" along with "Use SMTP for receiving incident reports on Lucy" is the other way to deliver phishing reports to Lucy. You can specify, for example, some custom email like email@example.com as a primary email in Incidents settings, check both those checkboxes and point separatedomain.com MX records to Lucy. So all emails being sent to firstname.lastname@example.org will be intercepted by Lucy, as well as emails sent from Outlook plugin - they will be added to "Incidents" page. If you just want to receive a copy of incident report to your own email (email@example.com), that is not tied to Lucy, then you should keep "Use SMTP for receiving incident reports on Lucy" checkbox clear - in that case Lucy won't attempt to intercept anything and the plugin will just forward all reports to firstname.lastname@example.org.
There is a possibility to use your own plugin to report emails to LUCY. To do this you need:
After these steps are done you can forward any email as an attachment to the configured email address and LUCY will treat these emails as incident reports and display them on the "Incidents" page.
When configuring Incidents Plugin one has a whole variety of features to choose from. That might be a bit stunning especially when talking about initial integration of the feature into personnel training workflow. However, there are several common use cases for the plugin and in order to make acquaintance with the feature more pleasant, we added some standard configurations below. Start with those and change tool configurations depending on the awareness strategy that you choose.
The standard configuration: all the reported emails (including phishing simulations) will appear under Incidents tab in Lucy web-interface.
The reports will appear at Lucy Incidents tab. No phishing simulations will be delivered, only real spam emails reported by the users.
There are two ways of configuration in such a case depending on the delivery method (HTTP or SMTP).
The standard configuration: all the reported emails (including phishing simulations) will be forwarded to the defined mailbox outside Lucy (custom mailbox) One can add several mailboxes divided by the semi-colon (;) to the email field. Reports will be forwarded to all of those. Please note that If Send reports via SMTP feature is enabled one cannot send emails to the same domain (e.g. "example.com") anymore: this setting will cause Lucy to intercept all the emails to "example.com" domain.
The reports will be forwarded to a predefined custom Lucy mailbox and will not appear in Lucy web interface. Only real spam emails will be reported and reports for phishing simulations will be ignored. Please note that If Send reports via SMTP feature is enabled one cannot send emails to the same domain (e.g. "example.com") anymore: this setting will cause Lucy to intercept all the emails to "example.com" domain.
In order for Lucy phishing emails to appear in campaign statistics in Reported section, the simulation emails must be delivered to Lucy. None of the real emails will be forwarded to Lucy Incidents, but one will be able to see which users reported phishing simulations. Please note that such configuration also excludes the possibility of analysis for the reported emails (in case user reports a real spam email) inside Lucy. The reported emails will be forwarded only to the predefined mailbox. Please note that the email address should have the domain name which MX records point to LUCY.
If recipients for some reason stick to using the good old plugin that has been built in the mail client for ages, one may configure Lucy to receive both attack simulations and real phishing reports from 3rd party plugin. Please note that the email address should have the domain name which MX records point to LUCY.
For a more convenient way to report the mail, there is a way to create a keyboard shortcut in Outlook.
First, right-click on the Phishing Addon Button and add it to Quick Access Toolbar.
The small icon would appear in the Toolbar in the left top corner.
By pressing Alt the quick access indicator will show which button is assigned for the Report shortcut.
Selecting an email and pressing Alt+3 will report the email