{"id":2803,"date":"2025-02-18T06:28:21","date_gmt":"2025-02-18T06:28:21","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/?p=2803"},"modified":"2025-02-21T04:51:01","modified_gmt":"2025-02-21T04:51:01","slug":"phishing-campaign-are-decision-makers-vulnerable","status":"publish","type":"post","link":"https:\/\/www.hackmosphere.fr\/en\/phishing-campaign-are-decision-makers-vulnerable\/","title":{"rendered":"Phishing campaign: Are decision-makers vulnerable?"},"content":{"rendered":"<p>[et_pb_section][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text]<!-- divi:heading {\"backgroundColor\":\"white\",\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading has-white-background-color has-background\">Phishing: an underestimated threat<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Cybersecurity is a major issue for companies, and malicious <a href=\"https:\/\/www.economie.gouv.fr\/dgccrf\/les-fiches-pratiques\/phishing-hameconnage-soyez-vigilant-sur-les-informations-que-vous\">phishing <\/a>campaigns are among the most frequent threats. Yet corporate decision-makers, including CEOs and CTOs, are sometimes the weakest links when it comes to raising awareness. <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>As part of its mission to protect and raise awareness, Hackmosphere ran a phishing campaign targeting these strategic profiles. The results speak for themselves, underlining the need for increased vigilance in the face of malicious e-mails. <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:heading {\"level\":3,\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h3 class=\"wp-block-heading\">Definition of phishing<\/h3>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Before diving into the details of the research, it&#8217;s important to understand what phishing actually is. Phishing is a technique used by cybercriminals to deceive users and obtain sensitive information such as login credentials, passwords or financial information. Attackers use e-mails to pose as a legitimate entity, such as a bank, company or online service. They then ask victims to divulge their confidential information by clicking on a malicious link or by providing the information directly. Phishing can take many forms, including spear-phishing, which specifically targets an individual or organization, and whaling, which specifically targets a company&#8217;s senior management. These techniques are often highly sophisticated and difficult to detect.     <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:image {\"id\":2757,\"sizeSlug\":\"large\",\"linkDestination\":\"none\",\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"680\" src=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishing-1024x680.png\" alt=\"fishing hook\" class=\"wp-image-2757\" srcset=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishing-1024x680.png 1024w, https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishing-980x651.png 980w, https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishing-480x319.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n<p><!-- \/divi:image --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">Phishing campaign approach and methodology<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>To guarantee the reliability of our results, Hackmosphere has followed a rigorous, methodical approach.<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Target identification<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The campaign targeted two key decision-makers:<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list {\"type\":\"lower-alpha\"} --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>CEOs, often exposed due to their strategic role and external interactions.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>CTOs, in charge of technological decisions and naturally more aware of digital risks.<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Scenario customization<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Two distinct scenarios have been developed to specifically address each target:<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list {\"type\":\"lower-alpha\"} --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>An e-mail focused on a request for quote for CEOs, exploiting their reactivity to sales opportunities.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>An invitation to a technology summit for CTOs, playing on their expertise and interest in professional events.<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Creating the infrastructure &amp; sending e-mails<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The e-mails were sent via a secure platform and optimized for deliverability. The creation method is a fairly complex process that could require a blog post of its own. We won&#8217;t go into detail here, but here&#8217;s our approach:  <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list {\"type\":\"lower-alpha\"} --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Un nom de domaine a \u00e9t\u00e9 achet\u00e9 pour chaque sc\u00e9nario&nbsp;:<!-- divi:list -->\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>meditech-innovation.fr for CEOs<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>sommet-leaders-technologiques.fr for CTOs<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>We created our own infrastructure (using a VPS from a private cloud. Installation of tools such as Postfix, Certbot or Mailgun).<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Warmupinbox was then used to increase the credibility of mailing addresses and improve main-box placement rates.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Gophish was then used to create the campaigns and monitor their progress.<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Retrieving results<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>To analyze the results, two metrics were taken into account:<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list {\"type\":\"lower-alpha\"} --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Click-through rates<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Performance of anti-spam software used by volunteers<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:spacer {\"height\":\"31px\"} --><\/p>\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Example of timeline (time mail received and time clicked by victim) :<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:image {\"id\":2759,\"width\":\"649px\",\"height\":\"auto\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\",\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"830\" height=\"266\" src=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishingTimeline.png\" alt=\"stages of a phishing campaign\" class=\"wp-image-2759\" style=\"width:649px;height:auto\" srcset=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishingTimeline.png 830w, https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/phishingTimeline-480x154.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 830px, 100vw\" \/><\/figure>\n<p><!-- \/divi:image --><!-- divi:spacer {\"height\":\"37px\"} --><\/p>\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><em><strong>Limitations <\/strong>: you might ask why we didn&#8217;t go further and ask for confidential information? The reason is simple: having volunteer CEOs and CTOs from a variety of industry backgrounds, it was difficult to find a scenario that would have been applicable to all. So we chose to simplify the campaign.  <\/em><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">What are the results of the phishing campaign?<\/h2>\n<p><!-- \/divi:heading --><!-- divi:heading {\"level\":3,\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h3 class=\"wp-block-heading\">CEOs: a vulnerable target<\/h3>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The e-mail sent to CEOs simulated a request for a quotation for a tender. It read as follows: <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:code --><\/p>\n<pre class=\"wp-block-code\"><code><code><strong><em>Objet<\/em><\/strong><em> : Devis pour une prestation<\/em>\n<strong><em>Message<\/em><\/strong><em>&nbsp;:\nBonjour,<\/em>\n<em>Je vous contacte car j\u2019ai identifi\u00e9 votre entreprise dans le cadre de ma recherche dans le domaine {{.Position}}. Je suis int\u00e9ress\u00e9 par ce que vous faites et aimerais obtenir un devis.<\/em>\n<em>Si vous souhaitez participer \u00e0 l'appel d'offre, merci de prendre rendez-vous dans mon agenda ici : {{.URL}}<\/em><\/code><\/code><\/pre>\n<p><!-- \/divi:code --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Results :<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>64 e-mails sent<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>54 e-mails delivered to the main mailbox (84.5%)<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>24 clicks on the malicious link (37.5%)<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>No clicks from SPAM e-mails<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>These results show that almost <strong>4 out of 10 CEOs<\/strong> let themselves be tricked by a realistic simulation, highlighting their exposure to social engineering attacks.<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:image {\"id\":2761,\"sizeSlug\":\"full\",\"linkDestination\":\"none\",\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"639\" height=\"161\" src=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne1.png\" alt=\"CEO campaign results\" class=\"wp-image-2761\" srcset=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne1.png 639w, https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne1-480x121.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 639px, 100vw\" \/><\/figure>\n<p><!-- \/divi:image --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"level\":3,\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h3 class=\"wp-block-heading\">CTOs: greater vigilance<\/h3>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The e-mail aimed at CTOs played on their technical expertise and interest in professional events:<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:code --><\/p>\n<pre class=\"wp-block-code\"><code><code><strong><em>Objet<\/em><\/strong><em> : Invitation : Intervenez au Sommet des Leaders Technologiques 2025<\/em>\n<strong><em>Message<\/em><\/strong><em>&nbsp;:\nBonjour,<\/em>\n<em>Nous serions heureux de vous accueillir parmi nos intervenants, pour partager vos id\u00e9es sur l'avenir de l'innovation technologique dans le domaine {{.Position}}.<\/em>\n<em>Si vous souhaitez en savoir davantage sur notre conf\u00e9rence, vous pouvez t\u00e9l\u00e9charger notre programme ici : {{.URL}}<\/em><\/code><\/code><\/pre>\n<p><!-- \/divi:code --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>Results:<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>46 e-mails sent<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>29 e-mails delivered to the main mailbox (63%)<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>6 clicks on the malicious link (13%)<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>No clicks from SPAM e-mails<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Despite a credible, targeted campaign, CTOs were generally more vigilant than CEOs.<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:image {\"id\":2763,\"sizeSlug\":\"full\",\"linkDestination\":\"none\",\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"164\" src=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne2.png\" alt=\"results of the CTO campaign\" class=\"wp-image-2763\" srcset=\"https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne2.png 656w, https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2025\/02\/resultatCampagne2-480x120.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 656px, 100vw\" \/><\/figure>\n<p><!-- \/divi:image --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">Analysis and key findings<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>1. The importance of credibility<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The e-mail sent to CEOs was more credible, as it was based on a concrete business need (a quote for a service), whereas that sent to CTOs was based on a less tangible promise (to speak at an event). This underlines the importance of adapting attacks to target audiences. <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>2. Anti-spam system performance<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The statistics show a significant difference between the spam filters of the different providers:<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list --><\/p>\n<ul class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Gmail <strong>:<\/strong> only 2% of e-mails sent were classified as SPAM.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li>Office 365 posted the best performance, with the highest SPAM rate.<\/li>\n<p><!-- \/divi:list-item --><\/ul>\n<p><!-- \/divi:list --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p><strong>3. Mailbox training<\/strong><\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The e-mail for CEOs benefited from better training (via warmupinbox), which explains its higher deliverability rate compared to the e-mail for CTOs. This technical detail illustrates the importance of preparation in the success of phishing campaigns. <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">The potentially catastrophic impact of a real phishing campaign<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Although this phishing campaign was designed purely for awareness-raising purposes, the results reveal the immense risk to which companies are exposed when faced with real cybercriminals. In this simulation, the interaction stopped after the victim clicked on the malicious link. However, in a real attack, this click could have redirected victims to a fraudulent site designed to collect sensitive credentials, install malware or exfiltrate critical data.  <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Beyond the immediate impact associated with this research, such as identity theft or system compromise, the consequences can extend to strategic levels. Companies may suffer significant financial losses, breaches of sensitive data or serious damage to their reputation. These scenarios underline the urgency of strengthening phishing defenses, as a single human error can open the door to a major cyber attack.  <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">How can you protect your company from phishing threats?<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>The results of this campaign should encourage companies to step up their protection and awareness measures. Here are some key recommendations: <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:list {\"ordered\":true,\"start\":1} --><\/p>\n<ol start=\"1\" class=\"wp-block-list\"><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li><strong>Train your teams regularly<\/strong><br \/>Offer awareness-raising sessions to familiarize your employees, including decision-makers, with the most common phishing techniques.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li><strong>Strengthen your security systems<\/strong><br \/>Choose robust solutions like Office 365, which stood out in this campaign for its anti-spam effectiveness.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li><strong>Analyze incoming e-mails with vigilance<\/strong><br \/>Encourage systematic verification of senders and links (mouse over URLs to see their true destination) before clicking.<\/li>\n<p><!-- \/divi:list-item --><\/p>\n<p><!-- divi:list-item {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<li><strong>Test your staff with internal campaigns<\/strong><br \/>Organize regular simulations to assess your teams&#8217; level of vigilance in the face of malicious e-mails.<\/li>\n<p><!-- \/divi:list-item --><\/ol>\n<p><!-- \/divi:list --><!-- divi:spacer {\"height\":\"43px\"} --><\/p>\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><!-- \/divi:spacer --><!-- divi:heading {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h2 class=\"wp-block-heading\">Conclusion: raising awareness of cybersecurity is a strategic challenge<\/h2>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>This phishing campaign, carried out by Hackmosphere, has highlighted significant vulnerabilities among corporate decision-makers. CEOs, who are particularly exposed, need to redouble their vigilance, while CTOs show greater resistance. <\/p>\n<p><!-- \/divi:paragraph --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>To protect your digital assets and strengthen your organization&#8217;s security, proactive awareness and effective tools are essential.<\/p>\n<p><!-- \/divi:paragraph --><!-- divi:heading {\"level\":3,\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<h3 class=\"wp-block-heading\">Don&#8217;t know your overall level of awareness? Take action with Hackmosphere <\/h3>\n<p><!-- \/divi:heading --><!-- divi:paragraph {\"translatedWithWPMLTM\":\"1\"} --><\/p>\n<p>Would you like to test your teams&#8217; vigilance or strengthen your cybersecurity? <a href=\"https:\/\/www.hackmosphere.fr\/en\/contact\/?lang=en\">Contact us<\/a> today to find out how Hackmosphere can help. Together, let&#8217;s build a safe and protected digital environment. <\/p>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_section et_pb_section_0 et_section_regular\" >\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div><div class=\"et_pb_row et_pb_row_0 et_pb_row_empty\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div><div class=\"et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div> Phishing: an underestimated threat Cybersecurity is a major issue for companies, and malicious phishing campaigns are among the most frequent threats. Yet corporate decision-makers, including CEOs and CTOs, are sometimes the weakest links when it comes to raising awareness. As part of its mission to protect and raise awareness, Hackmosphere ran a phishing campaign [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"","_seopress_titles_desc":"Are corporate decision-makers really ready to counter cyberattacks? Discover the surprising results of a phishing campaign targeting CEOs and CTOs, and learn how to strengthen your defense against these invisible threats.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[43],"tags":[],"class_list":{"0":"post-2803","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-human-services"},"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/posts\/2803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2803"}],"version-history":[{"count":12,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/posts\/2803\/revisions"}],"predecessor-version":[{"id":2870,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/posts\/2803\/revisions\/2870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media\/2758"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/categories?post=2803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/tags?post=2803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}