Empower your users in the fight against malware: Register for our Webinar on June-29th!

Kereon is a LUCY Partner

Kereon is now a certified LUCY Ecosystem Partner

The Canadian Training and Cybersecurity Specialist Kereon has become a LUCY Value Added Reseller!

Kereon is a LUCY PartnerKereon is empowering their world-class training and Cybersecurity expertise to its worldwide customers with the LUCY Antiphishing Server. To face the ever growing Information Security challenges the company has developed a Security Awareness program called Awee® based on a multidisciplinary team of professionals. Kereons’ seasoned experts possess a success-based track-record covering:

  • Information Security
  • Training
  • Awareness
  • Project Management
  • Psychology (cognitive psychology based expertise)

“Our evaluation has shown that LUCY-Server is the best tool for performing phishing tests for our customers and partners. The flexibility and ease-of-use of the user interface enables us to save a lot of time, prepare different scenarios, and to carry out campaign during operations. We can only recommend LUCY!” – Patrick Chouinard, Chairman of the Board, Kereon.

Kereon helps us to move our do-it-yourself products closer to the Canadian enterprises. Having a local helps us a lot, especially as our LUCY Server is much more known in the English-speaking market than at home in Switzerland. Canada including its Franco Canadian regions, the United Kingdom and the USA contribute to almost half to our turnover”, says LUCY founder Oliver Münchow.

More Inquiries: Palo Stacho, co-founder | palo (a t) lucysecurity (d ot) com | LUCY Phishing GmbH | Seestrasse 13 |  8800 Thalwil | Switzerland | Contact LUCY here.

LUCY Server Overview Two Pager

LUCY Two Pager 2017

All you need to know about LUCY Server on one sheet of paper. The Two Pager Overview for LUCY V 3.4.

 

LUCY Server Overview Two Pager

 

The functionality of the Cyber Prevention and Training Server is displayed on a single page using a simple feature list. Explore the full functionality of LUCY Server in a compressed form.

 

 

Results from the Customer Survey 2017

Key findings: 84% of the participants recommend LUCY Security and two-thirds of the respondents are willing to call themselves publicly as a reference customer! And more than 70% of the participants are interested in a user group.

For us, it is also interesting that almost half of the submitted suggestions for improvement are already available as LUCY features.

would-you-recommend-lucy-2017

 

In Feb / Mar 2017, clients of LUCY Security were asked to conduct a customer survey. The return rate was relatively high at 28.4%. The survey was conducted by the company itself on the basis of a short email questionnaire.

LUCY Security was not founded until 2015. The fact that such a young and still small cyber security product manufacturer gets so good grades after such a short time is evidence of the quality of the product and suggests that Swissness is also a not to be underestimated competitive factor.

Furthermore, the results are amazing, because the IT security industry is known for its secrecy. The high popularity rates for a public user group suggest a rethinking in the market that cyber crime can only be fight and confined together. Secrecy is detrimental to the security of the company on the Internet!

 

Create and run a smishing attack in two minutes - LUCY screencast

Setup and Run a Smishing Attack in 2 Minutes – Educational Social Engineering with LUCY

A smishing attack is done easily with LUCY Server. Set up your educational social engineering campaigns and train your people.

Create and Run a Smishing Attack Simulations with LUCY Server. A Smishing Campaign is like a Phishing Campaign, but the distribution is done over SMS messages instead using email. With LUCY you can set up such a campaign as easy as a phishing simulation. This Video shows how it’s done. You need to have the mobile numbers from the recipients. Please take note that Smishing is unlawful in some countries! LUCY Security from Switzerland makes cyber prevention and IT-Security awareness affordable and available to everbody!

 

Ransomware Explainer Video by LUCY

Did you know that you can customize our Ransomware Explainer Video?

Adapt LUCY’s Ransomware Explainer Video to your own needs. Owners of a commercial edition can customize every educational video delivered by LUCY for a reasonable price.

Our Ransomware video explains in less than two minutes how to protect against Ransomware attacks. This is about the behaviour of each individual: do not open links from unknown, think twice before you click.

Many customers use the video without customization to train your organization. But there is also a considerable amount that want to individualize the video or they want to add customer-specific information into the video. With the help of our storybooks, which we deliver to the customer as needed, this is done quickly. This allows the desired changes or extensions to be clearly and easily documented and specified.

Thus, a rapid and low-cost individualisation of the learning content is made possible.

Contact us if necessary or if you have more questions here: Request a semi-custom video.

 

Educational Advanced Spear Phishing Simulation with the appropriate Malware

Advanced Spear Phishing Campaign and appropriate Malware [Video-Tutorial]

Suitable for reproduction: Build your own advanced Spear Phishing Simulation with the appropriate attached Malware with LUCY. A 30 minute video gives you the possibility to build up an advanced phishing and malware simulation almost off the cuff!

LUCY Founder Oliver explains how you can set up an advanced Educational Spear Phishing campaign and store it as an reusable template. Contents are:

  • Create a new attack template for your own purpose
  • Create a file-based or mixed advanced spear phishing scenario, using pre-defined templates.
  • Configure the phishing mails, so that thy contain personalized content
  • Configure and integrate harmless Trojans (Malware) into the file-based scenario
  • Set a default behavior of the Trojan (f.e. commands on the client to be executed or the listing of “Recent Documents” on the target computer)
  • Start, monitor and finalize the campaign
  • Reporting: Analyze the results of the Spear Phishing campaign
  • Useage of the scheduler with multiple scenarios (Q+A at the end)

You would like to reproduce/replay this educational phishing campaign? Just request a Demo System here:

 

Robert Bosch uses LUCY for Phishing Simulations

Customer Story – Experiences with the use of the LUCY Phishing Awareness Training Server at Robert Bosch

An interview with Patrick Zeller, Senior Manager Enterprise Security, Robert Bosch LLC.

Robert Bosch uses LUCY for Phishing SimulationsMarch 2017 – “Bosch” is one of LUCY Security’s first major customers. Thanks to its support, the LUCY Phishing and Awareness Training Server was able to develop rapidly. At the beginning of the year 2017, we interviewed Mr. Zeller on the use and experiences with the products.

Mr. Zeller, how and to what extent does Robert Bosch use the LUCY server?

Patrick Zeller: We use Lucy to educate our employees around the world, on the dangers and risks of phishing and to raise awareness about this. Our employees are given the opportunity to gain experience on this topic, within a safe environment.

And since when is the product been used by Bosch? Can you tell us something about the volume of the already-conducted campaigns?

P.Z.: After an initial evaluation in autumn 2015, we have been using the LUCY Phishing Awareness Training Server since spring 2016. We have conducted various campaigns in more than 10 different languages, with up to 300,000 recipients. Also, since the end of 2016 we have been using the new function of “USB phishing”.

Can you now say something on the benefits of the phishing simulations; has the awareness against cyber risks actually increased among the employees?

We have not yet performed enough campaigns to have proving evidence, with regard to the “click-through rates”. We expect the first KPIs by the middle of the year. However, the feedback of our employees on the respective campaigns is very positive. What we can say with certainty is that we have noticed a significant increase in the notification rates / reports on phishing emails to our internal CERT, as a result of the phishing campaigns carried out so far. This indicates an increasing general awareness of our employees.

Do you remember the incidents; have there been fewer breaches, infections, or something similar?

These are internal data on which I unfortunately cannot comment on. However, since security have always been a top priority for Bosch, we have traditionally been very well positioned here. We see the topic “Security Awareness Phishing” as a complementary tool and measure in our IT security portfolio.

Thank you, Mr. Zeller. Let’s now get to the product itself: why did Robert Bosch GmbH opt for LUCY?

In addition to its excellent price / performance ratio, the decisive factor was the fact that we could completely run the LUCY Phishing Awareness Training Server in-house or on-premise. This is important to us, as it ensures that no sensitive data from our employees leaves the company. Overall, this equally helped us to obtain approval from our worker`s council, since we could convincingly demonstrate and ensure that no employees are monitored. LUCY gives us the flexibility to individually design campaigns and to execute them completely anonymously. It is our goal to train our employees and not to carry out performance checks on them!

And how were the experiences so far?

Overall, it is very positive; as such, we’ve decided to continue with the LUCY Phishing Awareness Training Server. We appreciate the close contact with LUCY’s developers, who can directly support us in case of problems and who are always open for new feature requests. With the version 2.x, we had some performance issues at the beginning, but since the version 3.0, the product has significantly matured and it runs reliably. Unfortunately, the report generator can only be used to a limited extent, because we have very specific requirements, which is due to the size and complexity of our organization. Fortunately however, we can solve this by exporting the results, which we then appropriately prepare for ourselves, through our database applications.

Can you tell us about your favorite features or templates and how are you satisfied with the product?

To be honest, we rarely used pre-made templates in the past. We have too much fun in implementing our own ideas. In general, LUCY’s flexibility is certainly a feature which we greatly appreciate. Also, the “Randomized Phishing” and the “Double Barrel Attacks[1]” are among our favorite features, since they are very efficient and easy to configure. Currently we are looking at the new Phishing Incident Plugin for Microsoft Outlook (Note: Phishing alert button). Overall I can say that LUCY is a very efficient tool for my team, for creating awareness amongst our employees and it meets all our requirements!

Thank you very much for this interview, Mr. Zeller.

[1] In a double barrel attack, the system first sends the user a lure email with a teaser text. The system then waits for some time, before the actual phishing email is sent to the user.

About the LUCY Phishing Awareness Training Server

The LUCY Phishing Awareness Training Server is used for the simulation of technical social engineering attacks and it is universally applicable from SMEs (Small Application Areas Phishing LUCY Server Robert Boschand Medium size Enterprises) right up to large customers. The product can locally be installed at the customer’s location; a cloud variant is also available. The Swiss solution provides dozens of preconfigured phishing templates and training modules, which can be independently used by the end user. Through the “Phishing Incident Plugin” for Microsoft Outlook, the user is opportune by his/her quick reception of an alert, in the event of an attack; this thus reduces the work put in by the security team in the analysis of the threat.

For further information please contact LUCY Security at +41 44 557 19 37 or at http://www.lucysecurity.com/contact-team/.

You want to copy an existing Website for a Social Engineering Scam? (Simulation) – We show you how it’s done

After 2 (two!) minutes you have a cloned website for your Phishing Scenario. LUCY Social Engineering Simulation Server empowers you when you set up an IT-Security Awareness Campaign [Screencast].

Advanced Phishing Simulations: Clone a Website and add your own Login Form – Do you want to create a phishing simulation and you want to use an social engineering simulation with LUCY - Cloning an existing Website and inserting a login form for data capturealready existing website as a landing page? This 2 minute video shows you quickly how to create a custom landing page with the website copy feature and adding a custom login form for data capture.

Just create a new scenario and select an empty Web based scenario. You can also select any other Web based scenario template for the social engineering simulation you want to customize, because the “Website Copy Feature” overwrites the default Landing Page of the template.

The steps described in the webcast are

  1. In LUCY, create a new campaign, edit the basic settings and save it
  2. Create a new scenario by selecting a Web based attack template (or chose an empty one), populate all mandatory fields and save it.
  3. Go to the Landing Page Menu Item of the scenario you created just before
  4. Push the “Copy Website Button”, the ‘WebSiteCopy’ dialogue appears
  5. Fill out the fields:
    • URL – The source website you want to copy
    • Language – With that you’re defining your language version (LUCY allows multiple languages in the same campaign)
    • File – Select the appropriate value in the poplist, choose f.e. index.html
  6. Push the “Start” Button and the Website Copy is executed. Even really big sites can be copied. And it’s fast!
  7. After the copy is finished, use the Back Button of the dialoge (not of the browser)
  8. Go into the editor, place the cursor where you want to add the login form, push the button “Insert Login Form”
  9. The System provides you three predefined login forms. Select an appropriate one and press OK. If you want to modify it later on, you can do that manually.
  10. The login form appears on the landing page from you social engineering simulation / phishing scenario. Save your setup of the landing page and you’re done with it!

 

Thank you for using LUCY. If you want to see the full end-to-end process from setting up the campaign until sending out and tracking the phishing simulation messages, the just watch the longer webcast below.

Watch the full and more detailed Scenario: Social Engineering Simulation Webcast

 

 

Phishing Reports: How to read and analyze Stats of a Ransomware Simulation or a File based Phishing Attack

How do you read the results of a Phishing Campaign containing an file attachment or even of a Ransomware Simulation? A hands-on example explains how to get campaign insights and how to read LUCY Phishing Reports.

The initial situation and the question

You prepared a file based phishing scenario. The attachement is a word file containing a ‘malicious’ macro. And now you want to track the results.

Say you sent 50 messages, 20 were clicked (good campaign!), vou got 2 file downloads and 1 user activated the macros.

The Question: How can you list the users who downloaded the file, but didn’t activate the macros? For example you’re should have a list of 2 users somewhere for this but you can’t find it.

The Answers: Analyzing the Phishing Reports

1. Who downloaded the File and who did activate the macros? You can see who clicked, and who executed the file (success) in CSV for example (here’s an example of mixed scenario with macro) and the success condition set to “Data Submit”. As you can see it’s only the last user who downloaded AND executed the file has a ‘success entry’. The user who only accessed the file has only a success entry at link click (column ‘clicked):

Who clicked on the File Link? Who even activated the Word Macro in the File - Analyzing Campaign Reports generated by LUCY Anti-Phishing Server

2. Download summaries are visible in overall stats:

Summary Report on the amount of people who downloaded a attachement from a LUCY Phishing Simulation / Attack

3. See in detail how downloaded what and how was the success: But if you want to see in detail who downloaded a file you can sort the phishing report list by a variable that only appears if the user accessed the webpage (e.g. plugins) and then you can see in the details if the user downloaded the file and executed the file (= The check mark at “Successful Attack”)…

details if the user downloaded the file and executed the file. This is a success event of a file based phishing simulation

…or only accessed the link, downloaded the file, but did not execute the file (no success check mark):

A user downloaded the file but he didn't activate the word macro. This means that this particular phishing attack was not successful. Success Checkmark is empty - Antiphishing Simulation with LUCY Server

5. Alternative: Analyze transmitted Data back to LUCY – Another possibility to track only users who executed the simulation is to actually see under “Collected Data”. Such an event when a user is clicking a link/file is reported back to LUCY: 

When a user clicks on a link or a file, this information is send back to LUCY Phishing Server and is available for further analysis under the Menu "Collected Data"

Happy Reporting with LUCY Anti-Phishing and Awareness Training Server!