This is the main editor where you will make adjustments to your email template.
Attack Template Customization
Last updated
Was this helpful?
Last updated
Was this helpful?
Lucy offers two workflows for customizing templates: copying and editing an existing template, or starting from scratch with a blank canvas to create a new attack template.
We will select an existing template, copy it, and modify it to align with the organization's branding. We'll use the ChatGPT template.
Make a Copy:
Search for the copied template, select "Edit Template"
This page serves as the foundation for your template's settings, providing an opportune moment to establish all base parameters.
Once your base settings are defined, click "Save" to commit the changes.
Please note that adding a language does not automatically translate the content; it merely creates an additional folder designated for manual translation into the specified language.
After adjusting the base settings, select "Message Template" in the side panel.
At the top, options are provided to upload your own email template as a .zip file, clear all current attachments, or permanently delete attachments.
New in Lucy version 5.3!
Select Upload .EML to create an attack template from an email file. With this option you can create training scenarios from real-world phishing emails to better simulate the types of threats your organization faces.
Editing email content is language-specific; changes in one language won't apply to others.
Start with the Subject line by incorporating your company name.
In the email body, strategically place your company name wherever it's relevant to reinforce the impression of a genuine collaboration.
Add your company logo by selecting "Upload file or Image" and choose your logo file to insert at the bottom of the email for enhanced brand recognition and trust.
Lucy uses placeholder variables like %{VALUE}% to personalize email content for phishing campaigns. This allows Lucy admins to make emails more credible by including details like the recipient's first name, gender, or time-sensitive information.
Specifying the link within the attack email is crucial. Lucy automatically includes a %link% placeholder to use the campaign's domain in the link. If you want to change this link to another word in the email, you can do so:
Highlight the desired word.
Choose the "link" option in the visual editor toolbar.
Alternatively, you can use the keyboard shortcut (Ctrl + L).
Highlighting a word prompts a pop-up to define the link. By default, Lucy inserts the %link% placeholder, eliminating the need for further action from the administrator.
Modify your attack landing page. Lucy allows administrators to adjust default pages or upload their own. You can also copy a landing page from any target website.
Select your language before making edits. Changes are language-specific and must be made separately for each language.
Understanding landing page structure is key for successful data handling in Lucy. Each attack landing page has two files: index.html and account.html
Note: Do not modify the names of these pages: index.html
and account.html
, as they are hardcoded into the system.
index.html
serves as the login page to which users are directed after clicking the simulated phishing link in their email.
This action is standard in all attack templates. If you replicate a website, ensure you change the form action to "?login"
to enable the submission of user credentials back to Lucy.
If you inspect the source code, you will notice the following form action:
Edit the landing page with the WYSIWYG editor by changing text, dragging components, or uploading custom icons and images.
This setting allows you to specify whether the attack is email-based or a smishing (SMS phishing) attack. For detailed instructions on setting up a smishing campaign, please refer to our guide on .
You can change your default editor in the
In this example, the variable %name% is included by default, which automatically fetches the recipient's full name from the data.
If you want to indicate that this was a phishing simulation, you can achieve this by redirecting to an awareness page template. See our guide on .
Once you configure your attack landing page, you can proceed to .