This is a Phishing Simulation
Hi Amit, this was a safe phishing simulation designed to reflect real-world tactics targeting roles like yours at Abnormal Security. As a Senior Product Manager, you often engage with contracts and documents, which makes DocuSign-themed lures highly relevant. This simulation tested your attention to sender details, link behavior, and brand authenticity. Identifying these subtle signs is critical to reducing organizational risk. Reviewing the signals and advice below will strengthen your awareness and help you respond securely in similar real situations.
Simulation Email Preview
Key Security Signals
Email appeared from DocuSign but used 'secureworkspace-apps.com,' a domain not affiliated with the legitimate DocuSign service.
The visible name showed 'Jeffrey Divine' but the email address didn't match the stated company, creating a credibility gap.
Language pushed you to 'VIEW COMPLETED DOCUMENT' quickly without details on the document type or source, creating unnecessary urgency.
Advice for You
Always check the sender's domain carefully, especially in document-related emails, even if the name looks familiar or trustworthy.
Avoid clicking links in unexpected document notifications. Use direct logins to services like DocuSign to verify activity independently.
Watch for vague document references with high urgency. Real senders typically mention project names, teams, or reasons for signing.
- By clicking below, you confirm that you have understood the key security signals and advices that would help you identify similar attacks in the future.