Catch the phish before the phish catches you! This TryHackMe room is an interactive phishing awareness training program that tests your ability to identify suspicious emails through 10 progressively challenging levels.
this room presents you with various email scenarios, each requiring you to identify exactly one reason why the email constitutes phishing. The challenges progress in difficulty, testing different aspects of phishing detection skills.
Why is this phishing? Contains a suspicious third-party survey link
The email includes links to external survey platforms that should not be part of normal business communication.
Why is this phishing? Unusual request from a normally legitimate contact (compromised account)
When a trusted contact suddenly asks for unusual actions or information, it may indicate their account has been compromised.
Why is this phishing? Various social engineering techniques (not detailed in this writeup)
Intermediate challenges testing awareness of common manipulation tactics.
Why is this phishing? Offers require sensitive personal or banking details
Legitimate organizations rarely request sensitive financial information via email or unsolicited messages.
Why is this phishing? Uses urgent scare language to force action
Creating panic to rush decisions is a classic phishing tactic that bypasses rational thinking.
Why is this phishing? Asks to enable macros in an attachment
Requesting users to enable potentially dangerous features like macros in documents is highly suspicious.
Why is this phishing? Display name looks familiar but the email address doesn't match the organisation
One of the most common phishing techniques - spoofing familiar names with malicious domains.
Why is this phishing? Payment link points to a suspicious domain
Payment requests should always point to verified, official domains. Suspicious domains are a red flag.
Why is this phishing? Various advanced techniques (not detailed in this writeup)
More sophisticated phishing attempts requiring deeper security awareness.
Why is this phishing? Sender domain is a look-alike (e.g., rnicrosoft.com vs microsoft.com)
Typosquatting and domain imitation are advanced phishing techniques that can fool even experienced users.
After successfully identifying the phishing characteristics in all 10 levels, the room reveals the final flag:
Flag: THM{i_phish_you_not}
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
Common Types of Phishing:
According to the FBI's 2023 Internet Crime Report, phishing attacks resulted in over $4.2 billion in losses. Organizations worldwide face significant financial and reputational damage from successful phishing campaigns.
Human error is involved in 82% of all data breaches (Verizon DBIR 2023), with phishing being one of the most common initial attack vectors.