Hyperlink Attack
Last updated
Last updated
Definition
A hyperlink attack involves embedding malicious URLs in emails. When users click these links, they may be redirected to phishing sites, download malware, or unintentionally disclose personal information. For Lucy, success is measured by whether the user clicks the link.
An employee in the finance department receives an email that appears to be from their HR department, prompting them to complete a timesheet.
An employee receives an email purportedly from the HR department, containing a link to view their colleagues' performance metrics compared to their own.
A finance executive receives an urgent email that seems to be from the CEO, containing a payment link for an emergency account transfer.
Ready to set up your Hyperlink Attack? See our platform reference article on Adding an Attack to your campaign.
To help employees recognize and respond to hyperlink phishing attempts effectively, the following user detection methods can be incorporated into training programs:
Check Sender Details: Verify the sender's email address and domain to ensure they match the legitimate source.
Look for Red Flags: Be wary of emails with poor grammar, spelling errors, or unusual formatting.
Hover Over Links: Before clicking, hover over links to view the actual URL and ensure it points to a legitimate site.
Check for HTTPS: Ensure the website URL starts with "https://" and look for a padlock symbol, indicating a secure connection.
Suspicious Attachments: Avoid opening unexpected attachments or downloading files from unknown sources.
Urgency and Threats: Be cautious of emails that create a sense of urgency, pressure to act quickly, or threaten negative consequences.
Verify Link Text: Ensure the visible text of the hyperlink matches the actual URL. For example, a link labeled as “www.lucysecurity.com” should not redirect to “www.lucysecurtiy.com.”
Type Known URLs Manually: Instead of clicking on a link, manually type the known and trusted URL into your browser to ensure you are visiting the correct site.
Cross-Check Requests: If an email or message asks for sensitive information, verify the request through a separate communication channel, such as a phone call to the supposed sender.
Report Suspicious Links: Immediately report any suspicious links to the IT or security department for further analysis.
Use Reporting Tools: Deploy the Lucy Phish Button for all users to use as a reporting tool.