Skip to main content
Threat actor using a fishing rod to obtain information

the anatomy of a hack

CHAPTER 1: The Collector

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Auteurs de menaces utilisant une canne à pêche pour obtenir des informations

L’anatomie d’un piratage

CHAPITRE 1 : Le collectionneur

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Unsuspecting victim of cyber threats on their computer

the anatomy of a hack

CHAPTER 2: The In

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Victime sans méfiance de cybermenaces sur son ordinateur

L’anatomie d’un piratage

CHAPITRE 2: L’entrée

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Cyber security professionals fighting against threats

the anatomy of a hack

CHAPTER 3: The Set Up

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Professionnels de la cybersécurité luttant contre les menaces

L’anatomie d’un piratage

CHAPITRE 3: La mise en place

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
A person has been locked out of their computer

the anatomy of a hack

CHAPTER 4: The Long Game

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
  • Article
Une personne a été bloquée hors de son ordinateur

L’anatomie d’un piratage

CHAPITRE 4: La stratégie à long terme

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
  • Article
Man sitting at a desk with a computer and a target on him

the anatomy of a hack

Kick-off

  • Blog
  • Video
  • Quizzes
Un homme assis à un bureau avec un ordinateur et une cible sur lui

L’anatomie d’un piratage

Lancement

  • Blogues
  • Vidéo
  • Questionnaires

Knowledge Library

banner-image-csam-phishing

Bibliothèque des connaissances

banner-image-csam-phishing

Cyber Security Resources

Videos

Decorative banner image People gathering to seek knowledge on Cyber Security

RESSOURCES EN CYBERSÉCURITÉ

Vidéos

Decorative banner image People gathering to seek knowledge on Cyber Security
Cyber Security Resources / Knowledge Library / Category 1
Cyber Security Resources / Knowledge Library
Cyber Galaxy Defenders
{{tokens_earned}}
token
{{$t('messages.galaxy_tokens_earned')}}
{{tokens_earned}}
token
people on conference bell icon

New Year’s Cyber Security Games
Play Now

Play Game 1

Play Game 2

Jeux de cybersécurité du Nouvel An
joue maintenant

Jouez le jeu 1

Jouez le jeu 2

icon of girl using laptop
Are you sure you would like to cancel your request to attend Ontario’s Managing Digital Risks in the Broader Public Sector conference?

Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence Gérer les risques numériques dans le secteur parapublic de l’Ontario?

You will no longer be registered for this event, and will no longer receive communications from us. If you opted to attend in-person, your name will be removed from the list. If you have already received the virtual attendance link, you will still be able to access the conference virtually.

Please note that you are unable to re-register for the in-person portion of the conference online. If you would like to re-register, or if you have any further inquiries, please contact cybersecurityconference@ontario.ca.

Thank you,
Ontario’s Cyber Security Education & Centre of Excellence Team

Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications de notre part. Si vous aviez choisi de participer en personne, votre nom sera supprimé de la liste. Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand même accéder à la conférence de façon virtuelle.

Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si vous avez d’autres questions, veuillez communiquer avec cybersecurityconference@ontario.ca.

Merci,
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité

people on conference bell icon

Registration Status

You have requested to attend the Managing Digital Risks in the Broader Public Sector conference in-person. virtually.

Your status for the Managing Digital Risks in the Broader Public Sector conference is Approved Pending Approval Waitlisted Cancelled Denied


If you have any questions, please reach out to cybersecurityconference@ontario.ca.

Statut d’inscription

Vous avez demandé à assister à la conférence Gérer les risques numériques dans le secteur parapublic en personne. virtuellement.

Votre statut pour la conférence Gérer les risques numériques dans le secteur parapublic est Approuvé En attente d’approbation , Inscrit sur la liste d’attente Annulé Refusé


Si vous avez des questions, veuillez écrire à cybersecurityconference@ontario.ca.

Remarque
Veuillez noter que la version française des vidéos ne contient pas de voix off en français ; toutefois, une transcription en français est fournie pour référence.

Upcoming site outage for planned maintenance will begin on March 30th from 4:30 p.m. - 12:00 a.m. L’interruption du site prévues pour maintenance planifiée commencera le 30 mars de 16 h 30 à 12 h 00.

Cyber Security Ontario Cyber Security Ontario
  • English
    English Français
  • You are not logged in. (Log in)
  • Home
  • About us
  • Advisories
  • Expert Panel
  • Events
  • Resources
  • Home
  • Blogs
  • Videos
  • Quizzes
  • Knowledge Library
  • Learning Portal

Cyber Security Ontario Learning Portal

  1. Home
  2. Site pages
  3. Cyber Cindy's Phishing Frenzy - Part Two

Cyber Cindy’s Phishing Frenzy Part Two - Transcript

Anon: Okay, Phish. Let's see if my targeted phishing campaign works. I've written an email to Cindy that contains a file that has a malicious URL embedded within it. If she clicks on the file, malware will be released on her computer. I have name the file "Fiscal Year Planning", so hopefully she won't even think twice as she works in the finance department. Even better, I'll use one of the health care facility executives names as the sender to make it look like it's more legitimate. I'm sure we'll catch her now.

Narrator: While working at her desk, Cindy receives an email notification from her director. It's titled Urgent Request, which causes Cindy to panic. She immediately opens the email. Noticing a file titled "Fiscal Year Planning". As she goes to click on the file link, she pauses and remembers the top few tips that were shared in her cybersecurity awareness training.

Cindy: Hmm. This seems very suspicious.

Narrator: Cindy's director would never send something with such an urgent title, especially without talking to her about it first. Also, this email is not from the company domain, even though it has her name in the body of the email. There are also quite a few spelling errors throughout the email. After the suspicious emails she received this morning, Cindy decides it is better to be safe than sorry and reports the message as phishing.

Anon: Oh, Phish. It's been a few hours, and Cindy still hasn't clicked on the malicious URL in the spear phishing email. Have I lost my touch? You're right. I can't let this one get me down. I'll just try something different. Cindy will never see this one coming. I'll send her a malicious text message that contains a link for an e-transfer. I just know this text will be the catch of the day.

Narrator: Cindy has been working tirelessly all afternoon trying to meet all of her deadlines coming up. Suddenly, Cindy's phone buzzes, notifying her she has a new text. Cindy reads the text but doesn't recognize the phone number. The message tells her she has an e-transfer waiting to be claimed. Cindy looks at the URL for the link and pauses. The name of her bank is misspelled in the URL. She decides to delete the message as she doesn't know the number. She isn't expecting money from anyone and the link did not look safe to click.

Anon: No luck in this smishing attack either. The only thing I have left to try is Vishing. I will call her work phone number and impersonate her company's I.T. Service Desk. Hopefully she'll trust me enough to give me her password, which I can then use to access more sensitive company information.

Hello. This is I.T. Service Desk, George... Yeah, George. I'm just calling because my records show you need to update your computer. Wouldn't want it to have any bugs or anything, now, would you? I just need your password, and I can get it done right away for you.

Narrator: Cindy feels surprised by the phone call and thinks it's strange that the I.T. Service Desk would be calling her directly to remind her of the update. Even further, the agent wants her password. Remembering her Cyber Security Awareness training and trusting her gut instinct, Cindy decides to hang up the phone.

After hanging up the phone, Cindy feels uneasy about the suspicious emails, texts and phone calls she has received. Cindy decides the best choice is to tell the I.T. and security team what has been happening. She also recalls that she needs to follow the incident response plan created by the security department, not wanting anyone she works with to fall for any suspicious messages. She also decides to message all of her coworkers to remind them to stay on the lookout for any weird emails, text messages, or phone calls.

Cindy: Wow. It sure feels good to put what I learned in Cyber Security Awareness training into practice.

Anon: Well, Phish, it turns out these health care facility employees are a lot more cyber safe. than I originally thought. I won't let this deter me though. I'm still determined to infiltrate their organization. Time to think of even more cyber attacks.

◄ Cyber Cindy's Phishing Frenzy - Part One
Dan to the Defence - Part One ►
You are not logged in. (Log in)
Home
  • English
    • English
    • Français
Data retention summary
Get the mobile app
Supported by the Government of Ontario © King’s Printer for Ontario, 2012–23 | Terms of Use | AODA Inquiries
Soutenu par le gouvernement de l'Ontario © Imprimeur du Roi pour l’Ontario, 2012–23 | Conditions d’utilisation | Demandes de l'AODA
CSAM Supported by the Government of Ontario
© Queen's Printer for Ontario, 2012–21 | Terms of Use | AODA Inquiries
Cyber Security Awareness Month Footer Logo
CSAM Soutenu par le gouvernement de l'Ontario
© Imprimeur de la Reine pour l’Ontario, 2012‑21 | Conditions d’utilisation | Demandes de l'AODA
Logo de bas de page du mois de la sensibilisation à la cybersécurité