The Kill Chain: How a Click Becomes a Crisis

Click "Next Step" to trace the lifecycle of a phishing attack.

1. The Bait

Hacker sends an email: "URGENT: Password Expiring."

2. The Mistake

User clicks the link and enters their password on a fake site.

3. The Compromise

Hacker captures the credentials instantly.

4. The Incident

Hacker logs into the REAL account and steals company data.

Ransomware: Lateral Movement

Click ANY computer to start the infection. Watch how quickly it spreads through the network.

This is why we isolate infected computers immediately!

Mock Data Breach Search

Simulate a search on the Dark Web. (Don't worry, this uses fake data!).

⚠️ Oh no! Data Found.

This email appeared in 3 known data breaches.

Source: Adobe Hack (2013)
Email Address Password Hint
Source: LinkedIn Scraping (2021)
Job Title Full Name Profile URL
Source: Collection #1 (2019)
Old Password

What criminals do with this: They combine these pieces to steal your identity or guess your current password.

Incident Identification

Read the scenario and identify the threat.

Scenario: You turn on your computer. All your desktop icons are gone. The background wallpaper has changed to a red screen with a countdown timer and a demand for $500 in Bitcoin.