this post was submitted on 29 Mar 2025
975 points (98.8% liked)

iiiiiiitttttttttttt

764 readers
408 users here now

you know the computer thing is it plugged in?

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] magnetosphere@fedia.io 213 points 1 week ago (3 children)

“Here’s an offer for something we know you want and that a respectful employer would provide. Oh, you actually thought your employer respected you? You must be an idiot who needs special training.”

[–] lurch@sh.itjust.works 99 points 1 week ago (1 children)

The thing is, there were some hints in the email it wasn't legit, like bad sender or weird links. That was the test. That the employer is bad too, doesn't change the fact the employee fell for the bait.

[–] magnetosphere@fedia.io 37 points 1 week ago (1 children)

Fair enough. It would be nice to actually see the email.

load more comments (1 replies)
[–] Vinny_93@lemmy.world 52 points 1 week ago (2 children)

I feel that if your job requires you to drive, the company would provide the means of transportation. Heck, I work from home and I get to choose between either a company car with a card to fill it up whenever or a pretty roomy budget with a train card.

[–] magnetosphere@fedia.io 22 points 1 week ago (1 children)

Having a client in my car would be weird, especially when it smelled like last night’s takeout

[–] taiyang@lemmy.world 12 points 1 week ago (1 children)

This goes especially true for me. "Don't mind the baby seats, you can squeeze in right between them."

load more comments (1 replies)
load more comments (1 replies)
[–] piecat@lemmy.world 17 points 1 week ago

Which is why it's a probable attack vector. You think a malicious actor wouldn't do this?

[–] Affidavit@lemm.ee 149 points 1 week ago (11 children)

The only phishing e-mails I receive are from my employer. As a matter of process I report these e-mails like a diligent lackey, then upon receiving an e-mail congratulating me on passing their test, I report that one too. I think the non-test phishing reports undergo manual review so I hope I'm wasting someone's time somewhere in payback.

Still haven't forgiven them for a tone-deaf 'we care about you during COVID' phishing e-mail they sent when everyone was genuinely struggling.

[–] vodka@lemm.ee 31 points 1 week ago (2 children)

I report any and all emails from anyone on the CSIRT team as suspicious.

They did a phising test targeting every employee without informing me (internal ITSM lead) first. So they deserve the extra work, and my entire team does the same.

load more comments (2 replies)
[–] nelly_man@lemmy.world 31 points 1 week ago* (last edited 1 week ago) (1 children)

Same here, and I got annoyed at these emails filtering through the different rules that I have set up. I realized that the test emails all had some values in the headers to indicate them as such, so I set up a rule to filter them out to a separate folder. It obviously defeats the point, but it's much less annoying.

load more comments (1 replies)
[–] unphazed@lemmy.world 21 points 1 week ago

I just ignore all emails. I have found too many phishing emails and have decided that our systems appear to be compromised. It hasn't improved since I reported them, so I am playing it safe. PM me when you need to communicate, and keep meetings on the calendar, I'll show.

[–] Maalus@lemmy.world 14 points 1 week ago (1 children)

Except for the tiny fact that a phishing email wouldn't give a fuck about being "tone deaf" and would bank on the "nobody bad would ever send an email like this!".

[–] Affidavit@lemm.ee 26 points 1 week ago (1 children)

Sure, a genuine phishing e-mail wouldn't give a fuck. But fake phishing e-mails sent from an employer should give a fuck about retention and employee engagement. Drawing attention to how much you don't care about your employees while exploiting their emotions isn't all that conducive to maintaining a healthy workforce/morale.

There are ways to demonstrate the lengths bad actors are willing to go without being a douche.

As an example, find out something the employer actually will be doing (or already does) and pre-empt it with a related, but not identical, phishing test. After the test has elapsed, send a follow up explanatory e-mail, with genuine content e.g. "We won't pay you $10,000,000 to have a baby, but did you know about our generous maternity leave package?"

load more comments (1 replies)
load more comments (7 replies)
[–] Evotech@lemmy.world 104 points 1 week ago (3 children)

Companies will do that and then send links with url shorteners for totally legit things and wonder why everyone ignores then.

[–] wer2@lemm.ee 94 points 1 week ago (1 children)

My company has to send out emails like: "The mandatory training email is not phishing, even though it is flagged [EXTERNAL] by the system."

Me: "That's what a fishing email would say."

[–] pahlimur@lemmy.world 29 points 1 week ago (1 children)

We must be coworkers. They literally did this to our group yesterday for an external survey. And I refuse to fill it out.

load more comments (1 replies)
[–] 4am@lemm.ee 23 points 1 week ago

No, no, the point of the URL shortener IS so that everyone ignores them; they've been trained to. "No one RSVP'd to the pizza party so we canceled it. Also we are a great employer who lists things like Pizza Parties as job perks! They're totally real!"

load more comments (1 replies)
[–] slazer2au@lemmy.world 61 points 1 week ago* (last edited 1 week ago) (11 children)

Sounds about right.

Pro tip, set up a rule in your email client to send any email that contains the following phrases, phishme.com or knowb4, in the header to junk.

Note that I said header, not From field.
It is so stupid that orgs spend thousands of dollars on these products and you can be seen as not being a phishing risk because of their shitty systems.

[–] leisesprecher@feddit.org 87 points 1 week ago (5 children)

I'm a software developer. A few years ago, we were all sent mail by a sketchy looking company that had our company's logo slapped onto the header in the sloppiest way possible and wanted us to click on a link to a "mandatory Cybersecurity training".

Obviously everyone ignored it. Which is exactly what you'd want people to do. Turns out, it was real and not a scam, just incompetence.

[–] expatriado@lemmy.world 61 points 1 week ago

i think you all completed the training before it started

[–] Ephera@lemmy.ml 30 points 1 week ago (1 children)

Got a mail a few weeks ago:

Hello ,
thanks for signing up to <training I didn't sign up for>.

Turns out someone from management assigned us to that training and that's just the standard mail it sends...

My favorite was, though, when my company started using yet another awful Microsoft service and we got a mail that we could log into our account on microsoftonline.com. Turns out that obvious phishing domain is actually operated by Microsoft.

load more comments (1 replies)

A company I used to work for used paycom(dot)com for their HR software. So we would frequently get notifications from there for work stuff. One day I got an external work email telling me to click a link to a paycom(dot)net site to sign up for a raffle to win a free ipad. I thought that looked sketchy as fuck so I did a quick whois on the .net and .com sites. They were completely different and the .net site was basically entirely anonymised. So obviously at that point I was like "damn this phisher managed to get the .net domain for paycom. That's kind of impressive. I should let our IS guy know so he knows we're being targeted." So I shot off an email to our basically only IS guy and he responded by telling me that the email was legit and everyone in the company got it because the company was giving away an extra ipad they had. But he also said now that I pointed it out it was the sketchiest looking email he had seen in a while.

I honestly should have known better considering this is the same company where at one point a different IS person had sent me an email basically just saying "Your computer has a virus. Open this attachment to remove it." Turns out that was also legit and the guy who used my desk on first shift managed to get a virus somewhere but rather than comming down to fix it themselves IS just sent me an email with a script to run.

[–] Dagwood222@lemm.ee 12 points 1 week ago

Someone once said that people don't hate computers, they hate the idiots who program computers.

load more comments (1 replies)
load more comments (10 replies)
[–] sartalon@lemmy.world 49 points 1 week ago* (last edited 1 week ago) (1 children)

At my work, we got a phishing email a few weeks before Christmas.

It was for a gift card for a Honey Baked ham.

I was pretty sure it was a phishing test but apparently a lot of people fell for it. Enough so, that a fairly senior colleague blasted an email saying it was in poor taste since it was Christmas and a lot of people could really use it.

I thought that made it more effective training because a scammer would use that, but I also understand that it has the potential to fuck with people's emotions.

Anyway, that started a trend within the company's Teams and social platform, making jokes and sharing memes.

The CEO even emailed, agreeing with the original email blast and then had a real giveaway of honey baked gift cards.

[–] SpaceNoodle@lemmy.world 14 points 1 week ago

Sounds like a decent CEO.

[–] Blackmist@feddit.uk 40 points 1 week ago* (last edited 1 week ago) (1 children)

I got a message saying I needed to sign up and completed a course I'd never heard of so I marked it as spam and deleted it.

Turned out it was genuine...

[–] thewitchslayer@sh.itjust.works 22 points 1 week ago (1 children)

Last week I came in to work with an email that I received a $100 gift card. I immediately reported it as phishing and went about my day. A few hours later my manager asked if I received an email about said gift card and I told him I reported it. Turns out it was legit and was for good performance. Whoops

load more comments (1 replies)
[–] BackgrndNoize@lemmy.world 36 points 1 week ago (2 children)

I just don't open emails from my company unless the subject has the words Urgent or Action Required and even those I forward to the IT anti phishing email to annoy them, even when I know it's legit.

[–] Irelephant@lemm.ee 28 points 1 week ago (3 children)

Now all you get is emails which say urgent, so you don't know which are actually urgent.

[–] SirQuack@feddit.nl 16 points 1 week ago* (last edited 1 week ago) (1 children)

So far I've always installed a filter (at work, school, and privately) that removes the "high priority" flag from any mail.

If it can't wait, call me.

[–] Opisek@lemmy.world 19 points 1 week ago (2 children)

Yes, but also, don't call me.

load more comments (2 replies)
load more comments (2 replies)
load more comments (1 replies)
[–] Burninator05@lemmy.world 34 points 1 week ago (2 children)

In the last two months I have gotten about a dozen emails on my work account that tripped enough red flags for me to think they were phishing attempts. It turns out that they were all legit and failure to respond could be determental to still working there. Good thing our boss was looking out for us.

What I have learned is that I should respond to any half-assed email and ignore the years of annual training I've recieved to the contrary.

[–] cactusupyourbutt@lemmy.world 15 points 1 week ago (1 children)

I just mark any slughtly fishy mail as phising and send it to the helpdesk. Either I get s thank you back, or a „its legit“. either way, I dont need to worry about it anymore

load more comments (1 replies)
load more comments (1 replies)
[–] Confused_Emus@lemmy.dbzer0.com 29 points 1 week ago

My company sent one of these out made to look like a survey on employee thoughts and opinions on their compensation - a very real issue in our company that I suspect they just wanted to try and condition people not to talk about.

Replied back to let them know as such and to inform them it was an asshole move and I would not be completing their training. Was worth the HR write-up - fuck those suits, too.

[–] _core@sh.itjust.works 26 points 1 week ago (4 children)

I'm on our cybersecurity team and our last phishing sim was so real looking and legit sounding I thought it was real, and I knew the phish was coming. The only indicator was the sender email was a slight misspelling of Microsoft. I pointed out that that phish is not a fair phish, our users are not going to meticulously examine every email for microscopic indicators. Half if them are barely tech literate, but they're doctors or nurses and only know what they need to know to do their job. Our cybersecurity lead was completely in "wtf are you talking about? From Micrasoft.com is totally illegitimate" mode, I had to point out that our users flag 70% of the emails as phish, and phishing tests that look like completely legitimate emails aside from a single character out of place in an obscure location most of our users aren't even thinking if looking at undermine legitimate emails and increase our workload b/c we've trained our users to think every email is a phish test from cybersecuriry.

[–] jfrnz@lemm.ee 14 points 1 week ago (5 children)

I don’t see the problem, is that not the point of phishing tests? Users need to ensure the sender is legitimate before taking action such as clicking links.

load more comments (5 replies)
[–] VitoRobles@lemmy.today 10 points 1 week ago (1 children)

The cyber security emails in my company are so fucked up that everyone is paranoid to open up any email. Maybe it was fear. Or maybe it was collective malicious compliance. Or maybe we're all just sick of it.

A manager last week said nobody filled out a company intake form because they used a new survey software, so the url didn't look familiar.

The CFO emailed a PDF of a presentation and people were afraid to view it during meetings.

In the chat software, we are constantly going, "Is this real?"

Congrats security nerds.

load more comments (1 replies)
load more comments (2 replies)
[–] arotrios@lemmy.world 25 points 1 week ago (4 children)

They do this at my work. I simply report every external email I get as a phishing attempt.

As a result, I've caught all the fake phishing emails sent by our IT department, at the minor cost of them having to clear 50+ legit emails per day. My coworkers have been quite appreciative of my tactics against phishing, and have started to adopt my methods.

Strangely enough, the number of phishing tests IT has sent out has dramatically decreased since I was initially hired.

load more comments (4 replies)
[–] TrueStoryBob@lemmy.world 25 points 1 week ago

Corporate does this all the time to at my work.

The GM of my office came talk to me because I had actually won like employee of the quarter or something, but when I got the email with the "redeem here for your $50 gift card" I reported it as phishing. I asked him why they couldn't just go to the grocery store and hand me a physical gift card, he blinked for a moment like that hadn't occurred to him. I showed him the quarantined emails I get on Outlook every day from dozens of phishing attempts made to my work email everyday.

[–] baltakatei@sopuli.xyz 24 points 1 week ago (3 children)

Sounds like phishing tests are just the company outsourcing spam filtering to their own employees instead of paying for a spam filtering service of their own.

load more comments (3 replies)
[–] Kushan@lemmy.world 21 points 1 week ago (2 children)

Companies are damned if they do and damned if they don't. All the best security on the world will never prevent an attack from the universally weakest link - humans.

Best you can do is identify the humans that are likely to fall for it and remind them to be extra careful when clicking links in emails.

load more comments (2 replies)
[–] HmmKuchen@feddit.org 19 points 1 week ago

We also have anti fishing campaigns in our company and usually I do pretty well with those, but last year because of a running event they sent a mail out in regards to free T-shirts for the event. Most of the company including me failed gloriously.

[–] h4x0r@lemmy.dbzer0.com 13 points 1 week ago

You guys read your emails?

[–] CastorSulMush@lemmy.world 13 points 1 week ago

Lol that person is stupid. these test phishing mails are super easy to spot. I hope they don't work in tech

[–] The_Caretaker@lemm.ee 11 points 1 week ago (1 children)

If the email did indeed originate from the company you work for, they owe you a gas card. Employers can't offer you money or benefits as a practical joke and then just say "April Fools!" There are laws regarding offers from your employer for compensation and benefits.

[–] ilovepiracy@lemmy.dbzer0.com 1 points 4 days ago

It most likely didn't though, most phishing campaigns are offered by postmaster services. Not to mention, the email domain was probably not an official company one (this first sign of a phishing email).

[–] Rhaedas@fedia.io 10 points 1 week ago

This likely had several warning signs that can be used for even personal emails. 1) is it too good to be true? Definitely in this example. Give me a gas card physically and I might believe it. 2) look at the actual link before you click. If it's not part of the main domain for the company you're expecting, or not within the intranet at work, it's an automatic nope. 3) any oddities in the message or images that seem wrong. Misspellings, pixelated logos, etc. This is the smallest red flag, as often times getting a perfect email without any grammar or spelling issues means it didn't come from a manager, that seems to be a requirement.

load more comments
view more: next ›