Discover our new cyberattack simulation, the Spearphishing Simulation, a hacking method that specifically targets company employees to access confidential information.
With our solution, evaluate your employees' ability to detect and report suspicious emails through ultra-realistic Spearphishing simulations that use targeted and contextualized models to replicate hackers' techniques. Fully customize your simulation by choosing your own attack subject, logo, sender name, signature with an image, and select from over 30 business-specific domain names. By tailoring Spearphishing simulations to the information your employees are familiar with, Cyber Coach trains them to better protect your company against Spearphishing attacks.
Set up your first spearphishing campaign
Log in to your Mailinblack personal space and go to your Cyber Coach area.
From the "Manual Simulations" menu, under the "Campaigns" tab, click on "Add a campaign" to create a Spearphishing attack.
Name your campaign and choose the type of Spearphishing attack.
When using the spearphishing attack for the first time:
You will need to compose your own model.
Name your campaign, then click on Compose a Model.
From this page, you can configure your model.
Select the subject of the attack - Paid leave, new meeting, or package delivery
The Company to Imitate field is not editable as a Spearphishing attempt always comes from your domain
Configure your logo (Minimum size: 180 x 100 px. Max weight: 1 MB. Supported formats: .png .jpeg .jpg .gif)
Configure the email signature. You can add an image (e.g., an email signature) and modify the signature text (name and surname)
Choose the email layout
Configure the sender's details.
You can modify the prefix of the sender address, select the desired domain, and choose the sender's display name.
Advanced settings allow you to customize your attack model.
Once your model is configured, you can continue setting up your campaign by choosing your awareness model, the users to be aware of, and scheduling the sending of your campaign.
When you have already used the spearphishing attack:
Once your first Spearphishing campaign has been created, you can reuse the existing campaign model and modify it or compose a new model from this page.