| | |
LAB The Employee Hook 205
Skip
Professor Hook — Lab Briefing

"The best IT phishing email looks like Tuesday morning maintenance. Today you'll build one from scratch — and then we'll tear it apart together. Alex Reyes is waiting."

PHASE 1 — ATTACKER MODE

Build the IT Helpdesk Credential Phish

Make 5 choices to assemble the most convincing IT impersonation attack on Alex Reyes at TechFlow Solutions.

1
Sender Spoofing
How do you disguise the From field?
2
Subject Line Urgency
What compels them to open immediately?
3
Authority Element
What makes you seem like real IT?
4
Urgency Escalation
How do you prevent Alex from pausing to verify?
5
Call-to-Action Link
How do you phrase the credential harvest request?
Credential Capture Probability
Suspicious Convincing
Gmail — Inbox
/5 choices made · Keep going
PHASE 2 — DEFENDER REVEAL

You built this in 90 seconds.

So did the attacker. Now watch the same email get dissected — every red flag exposed.

Believability score built:
Gmail — Inbox
Red flags detected
/6 red flags revealed
DEFENDER PROTOCOL

5 Controls That Would Have Stopped This Attack

Call IT helpdesk on a number from your company directory

Never use a phone number or link from the email itself. The real IT team can confirm within seconds whether any action is required.

Hover over every link — the URL shown is not the URL behind it

Hover before you click. The button text says "Reset Password" — the URL says techfl0w-helpdesk.com. These are never the same in a phish.

Legitimate IT never asks you to re-enter credentials via email link

Real IT password resets are initiated from inside the company portal. An email link asking you to log in is a universal phishing red flag.

Enable MFA on all SSO and corporate accounts

Multi-factor authentication blocks credential phishing even when the password is successfully captured. The attacker needs the second factor they don't have.

Report suspicious IT emails — don't delete them

Use the "Report Phishing" button in your email client. IT security needs the full email headers and metadata to block the domain and warn other employees.

Change Alias

Choose your villain name, or roll the dice.

Share Feedback

Help us improve ScamAI University

Feedback received!

Thank you for helping us improve.