Dynamic Stages — Real-world attacks rarely involve a single click. They are multi-stage, progressively luring targets and bypassing security measures:
- Initial Contact — first communication designed to pique interest or create urgency
- Action Trigger — a link to a fake login page, or a prompt to provide sensitive information
- Follow-Up Communication — additional correspondence to verify the initial contact and action request
Multiple Methods of Delivery — Phishing is no longer solely email-based. We offer simulations that reflect this multi-vector reality:
- Email Phishing — the traditional and still most prominent method, involving impersonation through email communications
- Smishing — SMS messages containing malevolent links or requests for sensitive information
- Vishing — phone calls where attackers impersonate trusted entities to extract information
- Quishing — malicious QR codes that lead to phishing websites or trigger malware downloads
Bypassing Technical Controls — Threat actors are adept at finding ways around technical security measures:
- Lookalike Domains — domains very similar to real ones to see if employees notice subtle discrepancies
- Embedded Links — hiding malicious links behind seemingly legitimate text or buttons
- Redirection Tactics — seemingly safe links that redirect to a phishing site
- Social Engineering Bypasses — time-sensitive pressure on employees to bypass standard security protocols
- Polymorphic Attacks — dynamically changing characteristics with each attempt to evade detection
Exploiting Human Behaviour — APS taps into human emotions to test employees’ critical thinking under pressure:
- Urgency — scenarios that demand immediate action to bypass careful consideration
- Concern/Fear — threats of data breaches or operational disruption if specific actions aren’t taken
- Curiosity — intriguing or sensationalised content to entice users to click without proper scrutiny
Adapting Tactics — We operate on a continuous improvement cycle:
- Regular Simulations — ongoing campaigns to track progress and identify emerging vulnerabilities
- Evolving Content — adapting content, complexity, and focus based on previous campaigns and the latest threat intelligence