This application is a continuation of application Ser. No. 16/801,130, filed Feb. 25, 2020, now U.S. Pat. No. 11,159,545, which is a continuation-in-part of application Ser. No. 16/532,449, filed Aug. 5, 2019, now U.S. Pat. No. 11,146,575, which is a continuation of application Ser. No. 16/418,973, filed May 21, 2019, now U.S. Pat. No. 10,375,093, which is a continuation of application Ser. No. 15,905,784, filed Feb. 26, 2018, now U.S. Pat. No. 10,298,602, which is a continuation-in-part of application Ser. No. 15/584,002, filed May 1, 2017, now U.S. Pat. No. 9,906,554, which is a continuation of application Ser. No. 14/986,515, filed Dec. 31, 2015, now U.S. Pat. No. 9,906,539, which claims the benefit of U.S. Provisional Application No. 62/145,778, filed Apr. 10, 2015. This application is also a continuation-in-part of application Ser. No. 16/181,122, filed Nov. 5, 2018, which claims the benefit of U.S. Provisional Application No. 62/581,637, filed Nov. 3, 2017. This application also claims the benefit of U.S. Provisional Application No. 62/810,369, filed Feb. 25, 2019. The entire contents of each of the foregoing applications are incorporated herein by reference.
The present invention relates to methods, network devices, and machine-readable media for an integrated environment for receiving a report of a suspicious message having been received in a user account, identifying other accounts that have received similar messages, quarantining and unquarantining those messages, and generating simulated phishing messages based on the identified suspicious message.