DEV Community

Dave
Dave

Posted on

That time a KnowBe4 phish test caught the wrong person

My employer pays KnowBe4 to randomly conduct phishing tests on all employees, and not so long ago, I got an email that looked (at first glance) legit, from "LinkedIn Security."

The first thing that peaked my interest, was that I have a LinkedIn account, but not associated to the email address that their "Security" team were talking to me about. Since I'm now interested, I paid closer attention to the sender address, and they were missing an E in "LinkedIn" - bingo, it's 100% bogus.

So, following corporate policy, I kick a ticket at our First Line staff along the lines of "hey, if this isn't a KnowBe4 test, consider blacklisting the domain."

A while later the reply came back, saying that they were blacklisting the domain. I replied, with a screenshot of the host command demonstrating that the host in the "click me" link is a CNAME'd alias for KnowBe4.

KnowBe4 targetting is off a little, but they definitely caught someone that needs training!

AWS GenAI LIVE image

How is generative AI increasing efficiency?

Join AWS GenAI LIVE! to find out how gen AI is reshaping productivity, streamlining processes, and driving innovation.

Learn more

Top comments (0)

Sentry image

See why 4M developers consider Sentry, “not bad.”

Fixing code doesn’t have to be the worst part of your day. Learn how Sentry can help.

Learn more

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay