HAI ROBOTICS

You have been redirected to this educational page because you clicked on a suspicious link. In a real phishing attack, your personal information, passwords, or financial data could have been compromised.

What just happened?

The link you clicked was designed to look legitimate, but it was actually a simulated phishing attempt. This demonstrates how easy it is to fall victim to these attacks.

The Good News

This was only a test to help you learn. No actual harm was done, and your information is safe. Let's use this as a learning opportunity.

5-Second Self-Check to Identify Phishing Emails

Quick Identification Checklist

1

Sender

Is the domain really from your company/partner? (Check letters and suffix carefully)

2

Recipients

BCC to multiple people? Irrelevant to your role?

3

Tone

Urgent/Threatening/Coercive/High rewards?

4

Links

Hover to preview - does it point to an unfamiliar domain?

5

Attachments

Does it require "Enable Macros/Content/Editing"?

6

Information Request

Asking for passwords/verification codes/bank cards/ID photos?

7

Payment Changes

Vendor account changes, urgent payment requests?

8

QR Codes

Is the source trustworthy? Does the landing page require login?

9

Spelling & Format

Mixed languages, typos, abnormal formatting?

10

Unauthorized Requests

Manager asking for private transfers/data, bypassing procedures?

💡 Tip: If any of the above seems suspicious, do not click links or download attachments. Contact your IT security team immediately for verification.

High-Risk Scenarios at Work

Be extra vigilant in these common workplace situations

Finance & Procurement

  • Payment account changes
  • Urgent payment requests
  • Contract attachments

HR & Legal

  • Payroll statements
  • Recruitment resumes
  • Compliance investigations

R&D & Operations

  • Fake code reviews
  • Repository invitations
  • VPN/email password resets

Travel & Meetings

  • Public Wi-Fi QR codes
  • Meeting material downloads
  • USB drive gifts

Best Practices

Three core principles to protect yourself from phishing attacks

Check Domain, Don't Rush, Verify Twice Before Acting

Always verify the sender's domain carefully. Take your time to examine suspicious emails. When in doubt, verify through a second channel before taking any action.

Any Request for Passwords/Codes/Transfers is a Red Line

Legitimate organizations will never ask for passwords, verification codes, or direct transfers via email. This is an absolute red line - no exceptions.

Type Official URLs Manually, Don't Click Email Links

Always navigate to official websites by typing the URL directly into your browser. Never click links provided in emails, even if they look legitimate.

Test Your Knowledge

Can you identify these phishing scenarios?

Question 1 / 8Score: 0/0

Progress: 0/8

"Your account will be suspended, please verify your password within 1 hour." - What type of social engineering tactic is this?