Phishing measurement tool

With this tool, described in this blog post it is possible to compare different phishing emails and measure how advanced and complex they are. This form is dynamic; different rows will be added for different choices. In the bar below a percentage is eventually indicated: if the most advanced option (and thus most legitimate looking options) is chosen for each category, the action will be 100%. This does not mean that legitimate email automatically ends up at 100%: colleagues can also make typos, an internal newsletter does not contain a personal salutation or an external party has been asked to send a survey.

Category Element Choice
Context Reason Important value for the recipient
Examples: hobbies, charity, job-specific knowledge
Recent event
Examples: recent organizational change, changed employment conditions, migration to a new system
Current theme
Examples: corona, week of sustainability, Christmas
Timeless activity
Examples: survey, payment, invoice
Sender Own organization or colleague
Known organization
Unknown organisation
Private person
Goal Obtain information or initiate (offline) action
Examples: CEO fraud, submitting personal data, files or photos
Obtain money through online money transfer
Examples: fine or invoice that must be paid directly online
Obtain credentials
Link sends victim to login page
Obtain access by malware on website
Link sends victim to download page
Obtain credentials and access by malware on website
Link sends victim to login page and download page
Obtain access by malware in attachment
Attachment contains for example Office macro or ZIP file with malware
Blackmailing
Examples: paying Bitcoin through 'leaked documents', ransomware
Principle of influence Commitment, reciprocation and consistency
Examples: helpfulness requested, asking favor from employee
Social proof
Examples: other colleagues have also bought shares in the company
Liking, similarity and deception
Examples: conference invitation, special occasion for colleagues with the same function, possibility to support a good cause
Authority
Examples: question from the CEO, request from manager
Distraction
Examples: time pressure to fill in something, log in to another account
Curiosity
Examples: new message from colleague, new terms of employment, better lease arrangement
Content Taal en tekst
Multiple choices possible: choose all that apply
Language within organization
Flawless text without typos
Form of address within organization
No use of extra special characters and extra spaces
Design
Internal corporate identity
Text formatting and, for example, signature correspond to use within the organization
Copied corporate identity
Corporate identity is a copy of original organization
Recognizable corporate identity
Corporate identity contains, for example, logo and colors, but is not an exact copy
Neutral corporate identity
Corporate identity is neutral / attacker does not try to pretend to be another organization
Plain text
No style or formatting present
Personal information Victim is addressed with a correct salutation, first and / or last name
Victim is only addressed with the correct salutation (sir / madam)
Email contains personal information obtained through social media
Examples: place of residence, date of birth
Email contains personal information obtained from breach databases
Examples: leaked password, leaked email address
Email is impersonal, can be sent to anyone / all colleagues
Domain name Sender Email address is literally the email address of a colleague
The email account of a colleague has been abused by internal phishing
Email address is spoofed from own organization or known (relevant) organization
Email address is exactly like that of a colleague or other known entity due to incorrect email configuration
Email address uses expired domain name of own organization or known (relevant) organization
Email address contains a previously used (known) name
Email address uses typosquat name of own organization or known (relevant) body as domain name
Email address is a variation of a known email address, where characters are omitted or replaced
Email address contains own organization name or known (relevant) organization
Email address contains company name in the domain. Example: info@organization-office.com
Email address appears to be private (Gmail, Hotmail, etc)
Examples: sender from Gmail or Hotmail service
Email address seems random or from irrelevant instance
Examples: prize@flostracizedent.ru or use domain name of expired sneaker webshop with an email about Office 365
Attachment or download Document Office document with macro (possibly in RAR / ZIP archive)
Word or Excel document with macro
Executable (could be in RAR/ZIP-archive)
Executable like .exe or .dmg
Security and confidentiality Email signing
When possible
Email is signed
Received email has a 'sign' icon next to the email. Note: this is not possible everywhere.
Email is not signed