Skip to content

Report Phishing

Identify Threat

Please provide accurate answers in order to identify if its a legitimate or not a legitimate action.

Did you act upon it?

Specify what action did you take

Screenshot Evidence

Screenshot of suspicious email, text, or message further analysis.

Report Incident

Complete Report

  • Identify Threat
  • Did you act upon it?
  • Screenshots (Evidence)
  • Report Incident

Method you have received

Please specify:

Action:

Recovery measure: We recommend that you change your device password, all account passwords and run a full device scan on the Anti-Virus program. If you don’t have an Anti-Virus program installed, please purchase one. If this happened on a work computer, we highly recommend that you report the incident to the proper authority.

ATTENTION: Do not forward suspicious email or text to anyone since it can spread the malicious program. We recommend asking the third-party to delete the email, text, or message that you sent.

Do not reply to the suspicious sender, cybercriminals are using sophisticated tactics to penetrate your defense. As an example, criminals identify if your email is active when the victim replies to the sender.

Excellent work.

Evidence (attach screenshots)

Information such as: Subject, sender

Max. size: 512.0 MB

Message body

Max. size: 512.0 MB

Attachment names, or hover-over urls to identify validity.

Max. size: 512.0 MB

Your Information

By submitting this incident, you agree to share the suspicious incident for further analysis and for training purposes.