The Kill Chain: How a Click Becomes a Crisis
Click "Next Step" to trace the lifecycle of a phishing attack.
1. The Bait
Hacker sends an email: "URGENT: Password Expiring."
2. The Mistake
User clicks the link and enters their password on a fake site.
3. The Compromise
Hacker captures the credentials instantly.
4. The Incident
Hacker logs into the REAL account and steals company data.
Ransomware: Lateral Movement
Click ANY computer to start the infection. Watch how quickly it spreads through the network.
This is why we isolate infected computers immediately!
Mock Data Breach Search
Simulate a search on the Dark Web. (Don't worry, this uses fake data!).
⚠️ Oh no! Data Found.
This email appeared in 3 known data breaches.
Source: Adobe Hack (2013)
Email Address Password Hint
Email Address Password Hint
Source: LinkedIn Scraping (2021)
Job Title Full Name Profile URL
Job Title Full Name Profile URL
Source: Collection #1 (2019)
Old Password
Old Password
What criminals do with this: They combine these pieces to steal your identity or guess your current password.
Incident Identification
Read the scenario and identify the threat.
Scenario: You turn on your computer. All your desktop icons are gone. The background wallpaper has changed to a red screen with a countdown timer and a demand for $500 in Bitcoin.