Deceptive Emails to Assess Your Susceptibility to a Cyber-attack
What is Phishing?
Advanced Phishing Services
Targeted Spear-phishing Capabilities
Spear-phishing is a highly targeted phishing attack on a specific user (rather than a generic pretext to a group of people). Starting each engagement with reconnaissance and information gathering, we offer these highly-targeted capabilities into each social engineering assessment.
While many tools measure the users clicking links, how do you know the real risk to your environment?
We go beyond automated testing with a full attack simulation to identify the impact of social engineering.
Risk boils down to two factors: the likelihood of an attack vector and the potential impact it would have.
We are the only social engineering provider who includes both elements in our social engineering assessment reports.
Spearphishing is a highly targeted phishing attack on a specific user (rather than a generic pretext to a group of people).
Starting each engagement with reconnaissance and information gathering, we offer these highly-targeted capabilities into each social engineering assessment
Reconnaissance and Information Gathering
The collection of information is a critical stage of social engineering and often determines the success of the rest of the phishing assessment. Using a ‘black box’ approach, our security experts perform in-depth research to extract information on the target company.
Create Pretext Scenarios and Payloads
Once we have fully enumerated the target, the focus turns to craft the payload. These specifics include identifying departments, user roles, and associated pretext scenarios. These details ensure each user is researched thoroughly for the most successful, targeted engagements.
Engage Targets
Using carefully structured tactics and pretexts, CORE Security Labs’ security analysts engage employees via phishing emails. These emails often prompt the user to interact by clicking a link or downloading a malicious file. The emails and subsequent landing pages are crafted to appear authentic, often mimicking other sites and services.
Assessment Reporting and Debrief
After completing the campaign and aggregating results, a final report is delivered, providing the executive summary and specific details. The information also includes a thorough breakdown of risk and remediation steps and documentation of successful phishing attempts. Training guides are also offered, guiding the client in resolving the training and policy issues identified.
Optional: Employee Education
As an optional addition, CORE Security Labs provides user training sessions for client employees. Whether hosted in a recorded online webinar or an in-house training session, CORE Security provides quality security awareness training by the same experts who performed the initial engagement.
Integrate with Other Assessments
In a real-world social engineering attack, hackers don’t limit their approach. In addition to phishing, they may use vishing (Voice Phishing), SMShing (SMS text message phishing), and On-Site capabilities, physically attempting to gain access to building resources. Integrating all of these allows a much more thorough and accurate assessment of phishing risk.
Let’s have a chat!
Get insights into your web security
Contact us
Subscribe to Our Newsletter
Signup today for free and get notified of the next newsletter updates.
Enter your email address
SUBSCRIBE




