German Axsos AG becomes certified LUCY Ecosystem Partner

Zug, June 20, 2018 – The employee is the major target for Internet Attacks. 97% of all attacks target the person and only 3% target the technology. People are the central link in the IT security chain. Employees with high awareness and a secured technology stack are the best protection for an organization. The German Axsos AG is therefore further expanding its successful user-oriented IT security services with the help of LUCY Server.

Employee Awareness and Testing with Axsos AG – Axsos has recognized the strongly increasing need and offers phishing simulations and awareness training on the basis of the LUCY platform for this purpose. The LUCY Phishing & Technology Assessment Server is a software suite with which, for example, realistic social engineering, simulated phishing and malware attacks can be carried out. The eLearning portal integrated in the system allows effective employee education, which is necessary to be able to counter all possible Internet attacks.

LUCY Partnership with Axsos – LUCY Security AG announced a partnership with the German Axsos AG today, a powerful system integrator in the areas of IT security, IT infrastructure and software development. The company has over 100 employees and its headquarters in Stuttgart. Further branches are in Solingen, Dettingen an der Ems and Ramallah.

 

Axsos ist ein LUCY Partner für Deutschland

About Axsos AGAxsos AG offers user-oriented IT from a single source: Listening and customer understanding are the credo of the IT-integrator from Stuttgart with further locations in Germany and abroad. The company’s main service areas are IT security, IT infrastructure and software development. IT security is essential for every company’s success and Axsos understands the art of developing a suitable security strategy for your customers and finding the right balance between risk minimization and risk acceptance when implementing it.

About LUCY – LUCY Security AG offers software for simulated Internet attacks and cyber prevention. With the platform, phishing simulations, USB attacks as well as malware simulations and infrastructure assessments are immediately set up and executed. Phishing incident buttons for Gmail/Outlook help with real-time email threat analysis. More than 5000 active installations worldwide testify to the success of the LUCY server, which is also offered in a free version.

The excellent NPS of 85 and the outstanding Gartner Peer Rating of 4.8 confirm the quality of the up-and-coming Swiss company, which has office in Austin Texas and a worldwide partner network.

For more information plase contact palo  (a t) lucysecurity-do t-com

  • LUCY Security AG, Chamerstrasse 44, CH-6300 Zug, Switzerland, +41 44 557 19 37
  • LUCY Security LLC, 801 W 5th St, Suite 809, Austin TX 78703, USA, 512-917-9180

Find out how many of these potentially dangerous file types are allowed through to your network

You think that no such files reach your network or the mailbox of your employees? We don’t think so, because in that case you’d be cut off from the rest of the world. The automated mail and web filter test shows you which files and which contents reach your company network unhindered.

What’s going through? This is a frequently placed order or task, which our security specialists receive during IT security audits. The fact is that most organizations do not know whether and which mails with obscene content or messages with a given PDF exploit are effectively blocked or not.

If you want to answer the question reliably, you have to test all potentially dangerous file types, because sometimes the firewall filters out a message, otherwise it is a gateway device or the mail server itself. To do such a ‘delivery control’ manually is actually no problem. The corresponding file lists on the Internet provide information about potentially dangerous or manipulable file formats. You can use these and then use these lists to create a test scenario for

  • Sending the mail or
  • Check if they can be accessed and downloaded via browser

But the effort to do that is considerable. And then comes the problem that the actuality of such tests quickly becomes obsolete. Old loopholes and sources of danger are eliminated and new ones are created.

Therefore, a standardized, automated mail and web filter test is required! On the one hand, this can massively reduce the effort required for the test. On the other hand, professional and central maintenance ensures that the test is  always up to date.

New infrastructure test in LUCY Server: Mail and Web Filter Test (MWF)

LUCY Technology Assessements Category "Mail & Web Test"

With this MWF test, anyone can now check their network environment and email infrastructure for vulnerability – or rather permeability – to potentially dangerous file types and content. As is usual with LUCY Server, the whole process is prepared for the end user and easy to operate.

The user can decide whether he wants to do the complete test – for the mail infrastructure and for the browser download of various file types and contents. Alternatively, the LUCY system allows the test to be easily split into packages. This division is offered as standard, a further refinement is possible:

 

  • Dangerous File Types in archives
  • Files containing ‘Profanity’ (Sexual or rascist or other content)
  • Harmless Level 3 Files
  • Encrypted Class 1 Files
  • PDF & Office Exploits
  • Files containing obfuscated malware
  • Files containing harmless macros
  • Dangerous file types

A mail and web test campaign is set up within minutes and the test can start immediately! Here are some screenshots of the LUCY system, which give an insight into an ongoing test. Further detailed information is available in our LUCY WIKI!

 

Have fun with the LUCY-Server – We make cyber prevention affordable and available for everyone!

 

 

Envoy Data Corportration is a LUCY Software Distributor

Envoy Data now distributes the best solution for cyber prevention and IT security awareness

LUCY Security has entered into a partnership with the leading Value-Added Distributor of data security solutions.

Austin, June-16-2018 – “With Envoy, we have found a partner that suits us and actively helps us to develop the large American market better,” says Palo Stacho, co-founder of LUCY Security. “The support of Envoy in engineering, marketing and sales support is very convenient for us and we know that with the LUCY software the Envoy portfolio is extended by a very innovative solution!”

Visit the LUCY product page at Envoy : https://www.envoydata.com/partners/lucy-security/

About LUCY – LUCY Security offers software for simulated Internet attacks and cyber prevention. With the solution, phishing simulations, USB attacks as well as malware simulations and infrastructure assessments are immediately set up and executed. The scope of services is rounded off with phishing incident buttons for Gmail/Outlook and real-time email threat analysis.

The excellent NPS of 85 and the outstanding Gartner Peer Rating of 4.8 testify to the quality of the up-and-coming Swiss company, which has a branch office in Austin Texas and a worldwide partner network.

For more information please contact Colin (a t) lucysecurity-do t-com

  • LUCY Security AG, Chamerstrasse 44, CH-6300 Zug, Switzerland, +41 44 557 19 37
  • LUCY Security LLC, 801 W 5th St, Suite 809, Austin TX 78703, USA, 512-917-9180

Booth X 43 – Visit LUCY Security at Infosec Europe 2018 in London and get great gifts!

Our booth X43 is located in the startup area of Infosec Europe 2018, right next to the lecture hall on the first floor. Come by, we look forward to getting to know you personally!

Booth X 43 - Visit LUCY Security at Infosec Europe 2018

The founders Oliver and Palo are part of it. Let our team show you a 10 minute live demonstration of our antiphishing software. Ask us detailed questions about the security, performance and application scenarios of the LUCY Cyber Prevention Server. The founders Oliver and Palo will also be present.

We look forward to seeing you at Infosec Europe at the Olympia, London from 5 to 7 June 2018!

 

LUCY @ Booth X 43 on the 1st floor!

#infosec2018 / http://www.infosecurityeurope.com/

A1 Telekom, Adnoc, Autoriti Monetari Brunei Darussalam, David J Peck, Ethical Intruder, Frosta, Intuity, Principle Logic, Privasec, Sapphire, SEB, Siroop, Vaadata, VA Intertrading are official customers from LUCY Security

Meet 15 New Official Customers of LUCY

We are very happy that we can again officially name some customers! They come from all industries, not just from the information security corner.

 A1 Telekom, Adnoc, Autoriti Monetari Brunei Darussalam, David J Peck, Ethical Intruder, Frosta, Intuity, Principle Logic, Privasec, Sapphire, SEB, Siroop, Vaadata, VA Intertrading are official customers from LUCY Security

A1 Telekom, Telecommunication, Austria

A1 Telekom Austria is the leading communications provider in Austria with over 5.4 million mobile and 2.3 million fixed-network customers. The company operates its own networks and is a subsidiary of Telekom Austria, which is active in a total of eight Central and Eastern European countries. A1 employs over 8000 people in Austria. https://www.a1.net/

 

Adnoc, Oil & Gas, United Arab Emirates (UAE)

The Abu Dhabi National Oil Company (formerly Adgas) is one of the world’s largest oil producers. Adnoc is a state-owned company with a 90 percent share of the nationwide oil and gas reserves of the United Arab Emirates. https://www.adnoc.ae

 

Autoriti Monetari Brunei Darussalam, Banks – Finance, Sultanate of Brunei

The Central Bank of the Sultanate of Brunei is not the first such institution to count LUCY Security among its clients. But it is the first central bank we can call public J  http://ambd.gov.bn/about-ambd/

 

FroSTA, Food Industry, Germany

In Germany, as in the whole German-speaking area, FROSTA is a household name. It is the only frozen food brand with the Purity Law. 100% real pleasure. No tricks. No secrets. For over 10 years FRoSTA has consistently dispensed with additives and the company promises the best taste only from the best ingredients. Some LUCY employees are FroSTA fans! https://www.frosta.de/

 

SEB, Banking, Sweden and Estonia, Latvia, Lithuania, Russia and Ukraine

Skandinaviska Enskilda Banken (SEB) is a universal bank with the claim to be the leading Nordic bank. It has subsidiaries in all countries bordering the Baltic Sea and the Ukraine. There is also a worldwide network of branches for corporate customer business. The financial institute was founded in the 1850s by Oscar Wallenberg. https://sebgroup.com/

 

Siroop, e-Commerce, Switzerland

Siroop is a leading electronic marketplace in Switzerland. Products from local, regional and national dealers are offered from a single source. At siroop you can buy everything, over 1 million products and over 500 Swiss dealers are available in the e-Shop. https://siroop.ch/

 

VA Intertrading, Trade, Austria

VA Intertrading was founded in 1978 under the name Voest-Alpine Intertrading GmbH and is now an outstanding trading company and Austria’s leading trading house. In addition to trading activities, VA Intertrading offers services such as transport and logistics, futures and trade finance. The wide network of branches all over the world guarantees VA Intertrading customers optimal access to markets and manufacturers. http://www.vait.com/

 

New official customers from the cyber security industry

 

David J Peck and Associates LLC, IT Security, USA

The Pennsylvania-based company specializes in penetration and security testing. The specialists of DJPA belong to the power users of the LUCY server and the company is one of the top addresses for independent security tests on the American East Coast. http://www.davidjpeckandassociates.com/

 

Ethical Intruder Cyber Security, IT Security, USA

Ethical Intruder is a specialized security service provider with its own standard solutions and tailor-made services for the financial sector, retail trade, healthcare and medical technology. The company is based in Pittsburgh, the hometown of a LUCY competitor and we are very pleased that the well-known Ethical Intruder has nevertheless chosen LUCY! http://ethicalintruder.com/

 

Infiltration Labs, IT Security, USA

Infiltration Labs is committed to securing and testing our customers’ systems. Phishing assessments, social engineering, vulnerability assessments, training and other services are offered. The nationally operating company is based in Fort Lauderdale, Florida. https://www.infiltrationlabs.com/

 

Intuity, IT Security, Italy

Intuity, based in Padova, offers IT security services around’Red Teams’ or’Blue Teams’. This also includes vulnerability assessments and penetration tests, which are necessary to carry out the “official evaluation of the robustness of IT process support infrastructures” known in Italy. https://www.intuity.it/

 

Principle Logic, IT Security USA

The company around the security expert and well-known book author Kevin Beaver offers various information security services. These also include “Website and Application Vulnerability Assessments” or “Internet of Things (IoT) Vulnerability Assessments and Penetration Testing”. https://www.principlelogic.com/

 

Privasec, IT Security, Australia

Privasec, the Australian information security company, has a national and international clientele. With offices in Sydney, Melbourne, Brisbane and Auckland (NZ), the company provides Cloud & Cyber Security services, including Compliance, Risk & Governance and Pentration Testing Services. Particularly worth mentioning are Privasec’s Health Checks and ISO27001 services. https://privasec.com.au

 

Sapphire Security, IT Security, United Kingdom

Founded in 1996, Sapphire is one of the leading cyber defence companies in northern England and Scotland. The company has four offices in the UK and is one of only 42 companies in the UK that have achieved the level of certification to evaluate and certify the British “Cyber Essentials Programme”. http://www.sapphire.net/

 

Vaadata, IT Security, France
The aim of French Vaadata from Lyon is to democratise cyber security with innovative services suitable for both start-ups and large companies. Vaadata’s values are based on our shared passion for hacking and the human factor. These are values that are very similar to those of LUCY Security. It’s a great Infosec company! https://www.vaadata.com/en/

 

 

You buy a phishing service directly from LUCY and we guarantee the start of the campaign within 10 days.

Start a Phishing Simulation within 10 days and for 1800 Dollars!

We guarantee: In 10 days and for 1800 Dollars to your first LUCY phishing simulation or awareness campaign!

You buy a phishing campaign or IT security training directly from LUCY and we guarantee the start of the campaign within 10 days. Describe your requirements and we will set up a service for you based on our existing attack or training templates. If you are under time pressure, no problem: Just tell us your deadlines and we will make it possible.

You buy a phishing service directly from LUCY and we guarantee the start of the campaign within 10 days.

In our shop you can purchase LUCY Educational Social Engineering Services: training, phishing tests and more: We set up a phish campaign or awareness training according to your requirements and based on one of our existing templates and prepare everything. This also includes individual templating: we configure Phishing simulations, SMiShing’s, file-based attacks, a “bad media” attack (USB/DVD/CD) or a security training as required. The configuration of the LUCY server including the server configuration is also part of the service.

Of course we carry out the campaign for you but you can start it yourself if you want to. Reporting and debriefing is included. LUCY Security also support you in interpreting the campaign results.

You get everything for 1800 Dollars and within 10 days. Buying and running phishing simulations has never been easier!

Buy Phishing Services – What is included in the package?

  • Requirements analysis with the customer
  • Campaign Configuration
  • Domain reservation and configuration (if required)
  • User management and import (if required)
  • Templating: Set up a suitable attack/training scenario based on an existing LUCY template
  • Up to 4 iterations for refinement
  • Detailed reporting after the campaign
  • Support during the campaign execution
  • Implementation guarantee within 10 days, provided that the requirements are clear and can be covered by the standard scenarios.

No long projects, no lengthy preparations, no hidden costs! Get the best content from the product leader!

LUCY s at RSA

Thanks to you, our first RSA conference was a success!

More than 500 people from 31 countries(!) visited the booth of LUCY Security. The RSA Conference 2018 was a complete success thanks to the many great interested parties and visitors!

It was four intensive days that were worth it. We were able to make many new contacts and also talk to existing customers. It was clear that we could welcome many people from the USA and Canada. What surprised us, however, is the fact that we attracted a significant number of visitors from from:

  • Brazil
  • Japan
  • Korea and
  • Mexico

And we could even get to know some Swiss 🙂

 

 

 

 

 

— LUCY at RSA 2018 —

Short information: LUCY has more than 5000 Twitter followers!

We are very proud that LUCY has a Twitter community of over 5000 followers now! And not a single contact is bought! We thank everyone who follows us and look forward to many interesting tweets in the future!

 

gdpr code of conduct example

The LUCY Code of Conduct for GDPR compliance

At LUCY Security, a lean GDPR Code of Conduct provides guidance in dealing with the General Data Protection Regulation. We’ll show you what we’ve done.

As a Swiss company following also EU law, we have taken the European-wide introduction of the General Data Protection Regulation as an opportunity to revise our data security processes and we have introduced a GDPR guideline for our employees.

Our GDPR code of conduct helps our employees to comply with the  new law and it is nothing more than a brief list of the elements that are important to us as a software company. We have deliberately dispensed with legal language and a detailed description. We wanted to create a well memorable guide to GDPR and not write a book! Attention: LUCY Security has further security policies, the GDPR guideline is not the only security policy in operation. Here comes our GDPR Code of Conduct:

GDPR – Fundamentals

Data protection is everybody’s business! Every LUCY employee is obliged to handle personal or customer data responsibly.

The customer data belongs to the customer! Finally, the customer determines what the (his) data is to be used for. He determines the purpose.

The term data subject is also to be understood in this guide as a synonym for customer or data owner.

The customer is the so-called controller, LUCY is the so-called data processor.

LUCY is liable for data protection violations of the personal data held or for breaches of the law.

There is a DPO (data protection officer) in the company and the management of LUCY Security is equally responsible for compliance with the Data Protection Act.

GDPR – The Guiding Principles

  1. The employees of LUCY Security develop software that corresponds to the “Security by Design” approach. Privacy and data protection are as important in software development as speed, stability and maintainability.
  2. The unsolicited use of (customers/persons) data for purposes other than the purpose of origin is prohibited.
  3. Customer instructions concerning data must always be given in writing and must be followed immediately by LUCY employees.
  4. The LUCY employee checks whether a customer instruction for his data is regular or exceptional. The implementation of exceptional instructions may be subject to a fee. The DPO will be happy to help in such cases.
  5. LUCY Security also takes over future changes in the GDPR legislation.
  6. Customer data must be kept safe (data security) and with integrity by LUCY employees and subcontractors.
  7. The provision of data to subcontractors requires the explicit consent of the customer. The subcontractors have the same duties as LUCY itself and they must grant the customer the same rights. The subcontractor must also be able to prove that he fulfils the GDPR requirements and fulfils the duties.
  8. LUCY Security has a duty of proof that customer data is secure.
  9. Data is encrypted and access to it is secured.
  10. Customer data may not be freely viewed. An anonymization or pseudonimization is to be chosen, so that the access to the data processing for the LUCY employees can take place virtually only in the technical sense.
  11. LUCY and its employees implement technical GDPR measures: Encryption, pseudonimization, backup & restore, secure physical and it access. Further additional measures are reserved.
  12. LUCY and its employees implement organizational protection measures: They keep an ongoing record of processing activities (link to the document “Record of Processing Activities”), they maintain and document the data processing processes. Additional measures reserved.
  13. Regular security checks of the technical measures are carried out at least every 24 months.
  14. LUCY regularly checks / audits the organizational measures (process execution, directories, documentation).
  15. The customer or the data subject can request access to their data. The LUCY employees must support him without delay and free of charge and allow him access.
  16. Data protection incidents must be reported to the customer within 48 hours. There is an information obligation with cause, number of records affected, how it was compromised, what are the consequences and what countermeasures were taken. Databreaches are reported using a standard LUCY form.
  17. In the event of data protection incidents, the incident mitigation must be initiated immediately.
  18. If LUCY audits the data processing (of customer data) by third parties (authorities), this must be reported to the customer immediately.
  19. Enforcement authorities may audit the data processing or even view data, but they must present an official legimitation.
  20. A possible publication of the data to the authorities or other external parties is always only possible via the DPO and its consent!
  21. If the customer requests that he wants his data back, then these are to be given back to him immediately. This is usually equivalent to the end of a contract. Residual budgets, remaining license terms will not be refunded to the customer.
  22. Upon return of the customer data, a receipt must be issued and the data must be irrevocably deleted by LUCY.
  23. The customer has the right to audit his customer data, he must announce this at least 3 days in advance.
  24. This is a non-exhaustive list of LUCY’s obligation to support the following data-related customer business requests:
    1. Information requests (Where and how is my data kept?)
    2. Data corrections
    3. Deletion requests (If this refers to data relating to customer installations of ‘LUCY Server’, this can lead to the end of the contract)
    4. Restrictions on data processing (This can lead to the end of the contract)
    5. Exercise of the right of data portability (export of LUCY Server user data, possibly further data records)
    6. Exercise of the right to object to data processing (enforces termination of contract) at LUCY Security
  25. We don’t transfer Datasets to other countries (Non-EU, Non-Switzerland)

Acknowledgements and Signatures

I agree that I have read and understood all paragraphs. I will follow the policies

Place & Date

Signature DPO of the company / Signature of the employee

 

It’s a GDPR Code of Conduct Example!

The above Code of Conduct for GDPR is a practical example of LUCY Security AG from Switzerland. All content is subject to change. All information is without guarantee and LUCY Security assumes no liability for the correctness and completeness of the contents.

A simply formulated GDPR employee guideline increases the security in the enterprise, we are absolutely convinced of it!

Let us know what you think! Thank you.

April 2018.

 

LUCY Content Update 2018 with more than 165 new scenarios

165+ new and revised Phishing Test and Attack Training Templates – Large Awareness Content Update I/2018

Others require you to pay for new or individual attack and training templates. At LUCY, new Phishing tests, training courses or even videos are always included in the basic price! We show the highlights of the more than 165 new templates of the current content update I/2018. What is included in the Big Content Update?

New attack scenarios for Phishing Tests

We have delivered over 30 completely new new scenarios. It has been proven that many phishing tests that run simultaneously and are sent out at random have the greatest sensitizing benefit for employees. This is one of the reasons why the need for simpler’ hyperlink-based’ attack scenarios remains high. That’s why we added about a dozen new hyperlink scenarios. We also have responded to the various customer requests and now offer a’ hyperlink’ variant of some existing ‘web-based’ scenarios (these are the scenarios with landing page). In terms of content, customers report to us that phishing tests around the topics

  • Security alerts
  • Microsoft / Outlook 365 ©
  • notifications for any registrations on web platforms and
  • Smartphone / iPhone © Contests

Still achieve high victim rates (successful phishing simulations). This is why we have delivered further Best Practice templates in these areas.

New training templates

The need for more training modules is unbroken. Our new training modules range from interactive GDPR courses, new or revised videos to simple PDF onepagers.

Significantly more languages

All scenarios are now available in several language versions. The language bar usually looks like this:

Available Standard Languages Phishing Test and Awareness Modules

Languages supported out of the box

Today we can safely claim that most of the content is available in Dutch, English, French, German, Italian, Portuguese, Spanish and Turkish! Very often Russian and Ukrainian are added.

How do I get to the new content?

If you have installed LUCY, the newly available content is automatically reported to you. Otherwise, you can check in the Settings menu in the Download Updates section whether other new templates can be downloaded.

Can I maintain and develop my own templates?

Major customers such as Robert Bosch make intensive use of this functionality. International consulting firms maintain their own phishing templates, which are adapted and maintained on an ongoing basis for each country. LUCY is a standard software that was created for this purpose. This ensures reusability and investment protection.

Examples of the LUCY Awareness Content Update I/2018

Below we show you excerpts from the more than 165 new or revised training and phishing test contents. Have fun testing and training!

or download our free Community Edition here.

Educational and Training Modules

GDPR Course or TrainingGeneral Data Protection Regulation (GDPR) – This interactive e-learning course for employees introduces the GDPR and the key compliance obligations for organizations. It also aims to provide a complete foundation on the principles, roles, responsibilities and processes under the regulation.

 

LUCY Phishing VideoLucy Phishing Video (with Tracking Option) – This is our most successful 3-minute educational video about phishing attacks, shown in English, Spanish, German, Italian and French. Each video scene can be customized (e.g. custom branding) and translated into additional languages. See: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=create_a_custom_e-learning_video . This video allows you to track if the user watched the content.

Ohne Pager Training Phishing Awareness One Pager Phishing Awareness (responsive | 1.2) – This is a static one page long phishing awareness html template. It works with a min resolution of 360 pixels.

 

 

PDF Infoflyer for educational it-awareness purposesPDF Infoflyer – A one-page phishing awareness flyer (PDF) is embedded in this static web page. The editable word template is located within this scenarios template folder. After you make desired changes to the word file, please save it as a PDF with the name “info.pdf” and upload back to your LUCY instance using the file manager within this template. All content is 100 % customizable.

 

Phishing Security Exam V1.3 Phishing Security Exam (Version 1.2) – In this short interactive exam the user is asked a few multiple choice questions in order to test their knowledge regarding phishing. Duration: 10Minutes

 

 

Phisical Security CoursePhysical Security Course 1.2 – In this short security course, the user is presented a few facts about common threats and countermeasures regarding physical security (unattended devices, shoulder surfing, portable media devices, disposal of sensitive information, visitors, etc).

 

Secure Internet Usage Video Secure internet usage video – In this security awareness video we talk about secure internet usage. The content (animation, language, script) is customizable. More info about customization can be found here: https://goo.gl/HXN9SG .

 

Workplace Security CourseWorkplace Security Course – This course takes approximately 30 Minutes to complete. Upon completion of Workplace Security Awareness, employees and managers will be able to: Identify potential risks to workplace violence, describe measures for improving workplace security & determine the actions to take in response to a security situation.It is a long course requiring a superior skill leve.

 

New and updated Attack Scenarios / Phishing Templates

 

Bizarre News Phishing TestBizarre News – Some bizarre news article asking the user to click the link for more details

 

 

Confirmatin Social Media Profile as Phishing TestConfirmation Social Media Profile (hyperlink only) – A social media provider informs the recipient that a profile under his/her name has been created.

 

 

Contest as a phishing test

Contest (Link Only) -In this hyperlink scenario, people can participate in a contest to win a trip to Paris. This is one of the simplest templates but it is still effective. That’s why we reworked it and added some more languages.

 

 

 

Win an Iphone as a Phishing TestContest II – Win an IPHONE 8 v1.1 – As a part of a special promotion, the recipient can win an IPHONE 8 by registering with his/her company account.

 

 

Cutest Animals as Phishing TestCutest Animals – These animals were voted top 10 cutest in the world. The user is asked to click on the link to see full list

 

 

Dating Site Confirmation as Phishing TestDating Site Confirmation (Ladies) – An email that confirms subscription for a dating site and presents a few matching profiles. This template is intended for the male audience.

 

 

Tinder Confirmation as Phishing TestDating Site Confirmation (Gentlemen) – An email message that confirms subscription for a dating site and presents a few matching profiles. This template is intended for the female audience.

 

 

Dropbox as Phishing TestDropbox (Hyperlink Only) – In this hyperlink scenario the user is informed that a document on “DropoBox” is ready for download.

 

 

Email in Quarantine as Phishing TestYour action is required: email in quarantine 1.1 – This template is made to look like an innocuous spam quarantine message – something most people are used to seeing, but don’t pay a lot of attention to and wouldn’t necessarily question. It’s also preying on the user’s sense of curiosity, by saying you have quarantined messages, but not showing what they are. Once the user is logged in, he/she can download a PDF error report. The download can be tracked by the LUCY admin.

 

Email Access Restrictions as Phishing TestEmail Internet Access Restrictions -Using a new email security filter, the user is informed that his internet access will be fully or partially restricted.

 

 

Encrypted Email as Phishing TestEncrypted Mail (Download Only) – Encrypted e-mail access. The user is asked to download an encrypted e-mail message in an MS-Office © document.

 

 

Final notice as Phising TestFinal notice: unpaid services – You get afinal notice. A payment has not been received, and thus the account remains past due.

 

 

Funny IQ test as mock phish scenarioFunny IQ Test (Hyperlink only) – A hyperlink based scenario with a common IQ test question.

 

 

 

Funny IQ Test as Phishing SimulationFunny IQ Test Webpage – A web based scenario with a few common IQ test question.

 

 

Funny Pics as Phishing TestFunny Pics – Click on a link to explore funny pics on the web. It is a simple scenario but it is still working.

 

 

iCloud login as Phishing TestiCloud (Hyperlink Only) – This template simulates the iCloud tracking feature of lost/stolen devices.

 

 

 

Increase your mail storage as phishing testIncrease your internal mail storage – The user is asked to click a link to increase the mail storage quota in order to have access to the mailbox.

 

 

IRS Tax Refund as Phishing TestIRS Tax Refund – This is a real world tax refund scam example 😉

 

 

Lunch discount with macro as Phishing TestLunch Discount (Mixed with Macro) – Lunch discount voucher with a Macro available, after the user logs into the the authenticated area. This is a file based scenario including one of our own and safe droppers.

 

 

microsoft office 365 login as phishing testMicrosoft 365 © Online Login All new Version 1.2 – The message asks the user to login to his/her “Mircosoft Office 365” account. The login will generate an error, and the user will be able to download the software.

 

 

Microsoft Receipt as Phishing TestMicrosoft Receipt (eMail attachment only) – This is a file-based only scenario without a landing page. It contains a Word file with macros. When the macro gets executed, the script will simply connect back to LUCY using the built-in browser. No data is transmitted. You will have the ability to track who executed the macro.

 

Microsoft Virus as a phishing testMicrosoft Warning (Hyperlink Only) – The user receives a window style warning “Internet Browser is infected with a worm SVCHOST.Stealth.Keylogger.” and is asked to click on a link to resolve this.

 

 

Reedeem points from airline as phishing testRedeem points for Airline ticket – Some phishing scams do not ask for logins. Instead, they try to get some general information about the user by offering interesting giveaways. In this scenario, we ask the user to provide  information about past flights. Many people participate in these bogus giveaways thinking some of them might be genuine.  However, providing information about past flights is valuable for any attacker as it helps prepare more sophisticated attacks.

secure message waiting as mock phish templateSecure Message Waiting – In this hyperlink scenario the user will get a notification about a secure e-mail waiting in his inbox. This message template has different languages within the actual message body. The recipient can select the language at the top

 

termination of your email account as simulated phising attackTermination of your email account (Hyperlink Only) – Email messages which claim the recipient’s email account is in the process of being deactivated and hence he/she must click the link within the same email message to cancel the deactivation process.

 

termination of your email account as phishing testTermination of your email account – It is the same scenario as above. But after the ‘login’, the recipient will also be able to download a PDF error report. The download of this report can be tracked by the LUCY admin.

 

 

web surfing statistics as phishing simulation scenarioNew Web Surfing Statistics (Login & Macro) – Employees get asked to enter their MS-Windows credentials to access personalized web surfing statistics from a site, where they can download a detailed report that contains a Macro. This is still one of our most successful scenarios that’s why we reworked it.

 

simulation template: Workplace security notificationWorkplace Security Notification – “Workdaysystem”: a security notification from the workplace information system requires immediate attention. The notification details can be downloaded within the authenticated area as a traceable PDF

 

workplace security notification with word macro as phishing simulation (template)Workplace Security Notification (Download Only) – “Workdaysystem”: a security notification from the workplace information system requires immediate attention. The notification details can be downloaded as a traceable Microsoft Office © file with a Macro, that pings back to LUCY upon opening.

 

you have been tagged as phishing testYou have been tagged – Your picture has been tagged on “SocialHub”. Provide your e-mail and birth date to confirm that this is you!

 

 

your account was leaked as phishing testYour account was leaked! (hyperlink only) – The FBI Cybercrime Division informs the recipient that his/her email account was flagged in their database as potentially being used for fraudulent activity.

 

 

your account was leaked as phishing simulation including word macroYour account was leaked! (with Word Macro) – The FBI Cybercrime Division informs the recipient that his/her email account was flagged in their database as potentially being used for fraudulent activity. After filling the fields on the Landing Page, a MS-Word Document with a Macro will be available for downloading the database report. This is a new file based attack template.

 

premium membership account details as a phishing testYour membership account has been created – The user gets a notification that a membership account has been created and he has 24 hours to deactivate the account before his credit card gets charged

 

 

Train ticket purchase as phishing testYour train ticket is ready for download – The user gets a copy of his train tickets, which can be edited/viewed using a link

 

 

So that’s it so far. Keep on enjoying LUCY Server!

 

 or download our free Community Edition here.