Share this content in seconds -- simply copy and paste the following text into an email and send it to your end users.
Attack Spotlight: Lookalike Websites Trick Users
Be on the lookout for “lookalike” websites and links in emails, social media posts and online ads that mimic authentic sites. Attackers create lookalike websites that use known, trusted brand names, logos and images to fool users. Even our own brand could be illegally copied by cybercriminals. Attackers use lookalike sites for malicious purposes, like selling counterfeit goods, stealing passwords for legitimate websites and spreading malicious software.
The link below takes you to a brief (two-minute) module that helps explain the techniques cybercriminals use and how to avoid lookalike sites and links.
(Note: This link will take you to the website of Wombat Security, a division of Proofpoint.)
You can also read the attached PDF for more information.
More Attack Spotlight Content
Attack Spotlight provides infosec professionals with free, actionable content designed to arm end users against the most relevant real-world phishing attacks and lures being seen in the wild.