Double Barrel Phishing

Recognize the two-email trust trap.

What You'll Learn in Double Barrel Phishing

Double Barrel Phishing Training Steps

  1. Introduction

    Alice Thompson is a senior recruiter at Nexlify Solutions, an outsourcing company that specializes in connecting talented professionals with clients. As part of her role, Alice manages a comprehensive database containing sensitive candidate information including resumes, contact details, salary expectations, and personal data. Bob is a sophisticated cybercriminal who has been researching Nexlify Solutions. His goal is to gain access to the company's valuable candidate database, which he plans to sell to competitors for substantial profit. Bob has chosen Alice as his target after studying her LinkedIn profile and the company's structure.

  2. The Unexpected Call

    Alice is reviewing applications at her desk when her phone rings. The caller sounds professional and articulate, introducing himself as 'David Miller', a senior software engineer interested in opportunities at Nexlify Solutions.

  3. The Attack Begins

    During the phone call, Bob (as David) presents himself as an articulate and knowledgeable professional. The conversation flows naturally as they discuss his background, the role requirements, and company culture. About halfway through the call, Bob steers the conversation in a seemingly innocent direction.

  4. Gathering Intelligence

    Alice is being asked a seemingly innocent question

  5. The Email Exchange

    After the positive phone conversation, Alice sends Bob, disguised as 'David', detailed information about several open positions that match his background. Alice wants to enter David's details into the TalentHub Pro database because he seems like a very suitable candidate and she can get a hiring bonus. So she eagerly awaits his response email with his resume.

  6. The Preparation

    Meanwhile, Bob prepares fake TalentHub Pro login page. He created urgency for Alice to use TalentHub Pro for hiring and getting ready to exploit it.

  7. The Phishing Email Arrives

    Alice receives an email that appears to be from the company's IT department. The sender address shows it-support@nexlify-solutions-secure.com and includes the familiar company logo and professional formatting that Alice recognizes from legitimate IT communications.

  8. Reading the Email

    Alice clicks on the migration link, which opens what appears to be the TalentHub Pro login page. The website looks identical to the system she uses daily - same colors, logo, layout, and familiar interface elements. The URL displays 'http://talenthub-pro-migration.nexlify-solutions-secure.com/login' - but Alice is too rushed to notice the missing HTTPS encryption.

  9. Enter Credentials

    Feeling the pressure of the 5:00 PM deadline and an urgent need to preserve TalentHub acccess for adding David's details, Alice enters her username and password. The fake website immediately captures her credentials and displays a convincing message.

  10. The Successful Data Breach

    After a few seconds, the page redirects to the genuine Nexlify Solutions login page, creating the illusion that the migration was successful.