How to create a fake phishing campaign

Sep 9, 2025 | Cyber Services, Red Team

False phishing campaigns have become an essential tool for companies wishing to make their employees aware of the risks associated with cybercrime. Faced with a steady increase in phishing attempts, which remain one of the most common attack vectors used by hackers, organizations need to strengthen their resilience by testing their employees’ vigilance. The aim is not to trap in order to punish, but to create a pedagogical framework where first-hand experience provides a better understanding of the mechanisms of digital fraud.

What is the strategic role of a phishing simulation?

False phishing involves the controlled sending of e-mails resembling real scam attempts, with the aim of testing users’ ability to identify and report suspicious messages. These simulations enable us to measure an organization’s level of maturity in the face of threats, and to determine whether theoretical training is sufficient to reinforce vigilance. In a context where a simple click on a fraudulent link can lead to data theft, compromised accounts or the installation of malware, this type of campaign represents a strategic investment. It turns a potential mistake into a learning opportunity, and fosters a proactive culture of cybersecurity.

How do you define objectives and scope?

The success of a phishing awareness campaign depends on careful preparation. Before designing the messages, it’s essential to clearly define the objectives: testing employees’ reaction to a suspicious link, verifying their behavior when faced with a booby-trapped attachment, or analyzing their ability to report an incident. The scope must also be specified. Some companies choose to target all employees, while others focus on specific departments that are particularly at risk, such as finance, human resources or sales. Defining the scope and objectives guarantees that the simulation will be adapted to the realities of the organization, and will deliver usable results.

Why create fake phishing scenarios?

Creating a simulated phishing scenario requires a realistic approach. Emails should mimic the techniques used by cybercriminals: identity theft, use of official logos, messages urging quick action or attractive promises. However, the simulation must remain ethical and proportionate, without seeking to maliciously entrap. Scenarios can be inspired by real-life campaigns, adapted to the company’s context. For example, a fake parcel delivery message, a simulated bank notification or an unusual connection alert are credible situations that can be used to test vigilance without generating excessive mistrust. The diversity of scenarios is essential to avoid employees becoming accustomed to just one type of trap.

How important are technical aspects and logistics?

Setting up an internal phishing campaign requires a suitable technical infrastructure. The company needs a platform or tool capable of generating and sending e-mails in a controlled manner, while collecting campaign results. Some specialized publishers offer turnkey solutions, integrating e-mail templates and dashboards to analyze clicks, opens or reports. In other cases, security teams can design their own system. It is also important to define a timetable for sending messages, to avoid too much predictability. Technical aspects need to be secured to ensure that campaigns remain internal and cannot be hijacked by genuine cyber-attackers.

How do you collect and analyze results?

A simulated phishing exercise is only of value if it is followed by a detailed analysis. The results show how many employees opened the message, how many clicked on the fraudulent link and how many reported the email as suspicious. These indicators provide a precise picture of the level of awareness, and help to identify weak points. For the technical implementation of these campaigns, solutions like Gophish can be used to manage the sending and tracking of emails, services like Namecheap are used to acquire credible domain names, while in-house scripts can automate the installation of a mail server. Complementary tools such as Warmup Inbox make it easier to warm up addresses used to avoid blocking by anti-spam filters. Analysis must go beyond the raw numbers: it’s essential to understand why certain people let themselves be tricked, and what improvements can be made. The aim is not to punish, but to transform these errors into educational opportunities and adapt training accordingly.

Why educate and train?

The effectiveness of an educational phishing campaign depends on the support provided to employees. Once the exercise has been completed, teams should receive a clear explanation of the results and a presentation of the signals that would have made it possible to recognize the attack. Workshops, interactive sessions or explanatory materials can complete the experience. Having experienced a simulation makes the lesson more concrete and memorable than simply reading theoretical instructions. This active teaching approach helps to reinforce day-to-day vigilance and develop a safety culture shared by all. The aim is to make people aware of their responsibilities, without making them feel guilty, so that everyone becomes a player in the protection of the organization’s data.

What are the organizational benefits of a phishing campaign?

By regularly running simulated phishing tests, companies benefit from a number of strategic advantages. They obtain an objective assessment of their level of human security, often considered the weakest link in the attack chain. They can identify the most vulnerable departments or profiles, and adapt training accordingly. They also demonstrate to their customers and partners their commitment to strengthening cybersecurity and protecting sensitive information. Last but not least, they are part of a compliance logic, since certain international regulations and standards recommend or require regular awareness-raising actions to reduce the risks linked to human behavior.