In a phishing attack, an individual (e.g., a person, an employee of a company, a user of a computing device) receives a message, commonly in the form of an email or other electronic message or communication, directing the individual to perform an action, such as opening a message attachment or following (e.g., using a cursor controlled device or touch screen) an embedded link. If such message were from a trusted source (e.g., co-worker, bank, utility company or other well-known and trusted entity), such action might carry little risk. Nevertheless, in a phishing attack, such message is from an attacker (e.g., an individual using a computing device to perform a malicious act on another computer device user) disguised as a trusted source, and an unsuspecting individual, for example, opening an attachment to view a “friend's photograph” might in fact install spyware, a virus, and/or other malware (e.g., malicious computer software) on the user's computer. Similarly, an unsuspecting individual directed to a webpage made to look like an official banking webpage might be deceived into submitting a username, password, bank account number, etc. to an attacker.
Generation of a Simulated Phishing Message