Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Reputation Levels
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
          • API Routes
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
    • Notifications
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Understanding the Attack
  • Checklist
  • Real-world Examples
  • User Detection Methods

Was this helpful?

  1. Guides
  2. Attack Simulations
  3. Attack Types

Data Entry Attack

PreviousAttack TypesNextHyperlink Attack

Last updated 6 months ago

Was this helpful?

Understanding the Attack

A data entry attack is a targeted effort where attackers deceive victims into entering their login credentials on a fake website. These attacks often leverage email spoofing, creating a sense of urgency or trust to compel the victim to act quickly.


Checklist


Real-world Examples

  • A corporate employee receives an email that appears to be from the IT department, instructing them to update their password on a fake company portal.

  • A user gets a notification from a popular social media platform about unusual activity and is redirected to a fake social media site to log in.

  • A recipient is notified that they are running late for a Teams or Zoom meeting and receives an email with a link to join the meeting. In their haste, they click the link and are prompted to log in on a fake Teams or Zoom login page, unknowingly entering their credentials.


User Detection Methods

To help employees recognize and respond to Data Entry phishing attempts effectively, the following user detection methods can be incorporated into training programs:

Email Analysis

  • Check Sender Details: Verify the sender's email address and domain to ensure they match the legitimate source.

  • Look for Red Flags: Be wary of emails with poor grammar, spelling errors, or unusual formatting.

URL Inspection

  • Hover Over Links: Before clicking, hover over links to view the actual URL and ensure it points to a legitimate site.

  • Check for HTTPS: Ensure the website URL starts with "https://" and look for a padlock symbol, indicating a secure connection.

Content Verification

  • Suspicious Attachments: Avoid opening unexpected attachments or downloading files from unknown sources.

  • Urgency and Threats: Be cautious of emails that create a sense of urgency, pressure to act quickly, or threaten negative consequences.

Login Page Checks

  • Website Appearance: Verify that the login page looks exactly as expected. Fake sites often have slight visual discrepancies.

  • Double-Check URLs: Manually type the known URL of the website into your browser instead of clicking on links in emails.

Communication Verification

  • Cross-Check Requests: If an email asks for sensitive information, verify the request through a separate communication channel, such as a phone call to the supposed sender.

Incident Reporting

  • Report Suspicious Emails: Immediately report any suspicious emails to the IT or security department for further analysis.


Ready to set up your Data Entry Attack? See our platform reference article on

Use Reporting Tools: Deploy the for all users to use as a reporting tool.

Ensure the sending Domain is whitelisted
Adding an Attack to your campaign.
Lucy Phish Button
Register an Attack Domain
Add a Data Entry Attack to your Campaign
Ensure "Data Submit" is set as your Success Action
This is an example of a Data Entry Attack, once clicked the user is directed to a fake landing page