Phishing Cyber Attack

Phishing Cyber Attack

More Options: Make a Folding Card

Storyboard Description

This storyboard does not have a description.

Storyboard Text

  •          YouTube
  • Comments: Anyone in 2018? 
  • What Does the Fox Say
  • Sup
  • You have a new email!
  • Gmail
  • You need to change your password
  • From: We prevented a unauthorized login to your account. The attempt was made by an account in Ukraine. Secure your account by using the following link:
  • Oh. I guess I should change my login.
  • Google Account
  • To improve your account's security, Enter your previous password: ******** Enter your new password: ******* |
  • Meanwhile...
  • Phishing is type of social engineering attack in which, by posing as a trustworthy entity in an electronic communication, a user's login information is obtained. In this section, the "bait", giving phishing its name, is distributed via email.
  • 100010101000101111010100101110001010 1101010101111110000010101001110110101 010100101010101010101010000101110101 1101010101010101010101010100010110101 101010101010100001000110100000010101 10001000101011100000010000010000100 0001110101110111100001001010111010101 110001010101010101000010010001111000 01000101000100001000010000100010101 0101010101010111110111110101010010100 11001010010101010101001011111101111110
  • We're in. They took the bait.
  • Here, the user makes a dire mistake in blindly trusting the email. One of the most simple and effective ways to prevent phishing attacks is to think before you click. Verify that the email is credible and accurate for the entity sending the email.
  • Whew! I'm glad Google caught that and let me know before anything bad happened. 
  • In this section, the user is unknowingly giving their login information to whoever is behind the attack. Note that the they link they were sent contained a URL redirect in the form of "", which hints to a possible phishing attack.
  • Access Granted to Inbox: 23 emails unread From- The President of the United States Subject- TOP SECRET  From- UK Prime Minister  Subject- Case #203E Evidence
  • Perfect.
  • In this scene, the attacker, now having the user's login information, gains access to the user's email, which is full of personal information. 
  • Person who administered the attack gains access to the user's email
  • The user sit unaware sits unaware of the attack. Hopefully, now, they will look into more preventative measures such as installing anti-phishing software, keeping their browser up to date, and using anti-virus software.  
  • This scene shows that the user's emails include sensitive information that the attacker can now use at their own will. Make sure not to take the bait in order to keep your own personal information safe!
Explore Our Articles and Examples

Try Our Other Websites!

Photos for Class – Search for School-Safe, Creative Commons Photos (It Even Cites for You!)
Quick Rubric – Easily Make and Share Great-Looking Rubrics
abcBABYart – Create Custom Nursery Art