Phishing Awareness Platform

Learn how phishing works, how to spot it, analyse suspicious links with the URL / domain checker, and practise with safe simulations. Education and research for students and staff.

Open URL / domain checker

Ethics: Use only with consenting participants. This site is for educational use. Simulation pages show a clear “Safe simulation” banner and do not send any data.

What is phishing?

Phishing is a type of social engineering attack where criminals try to trick you into giving away sensitive information—such as usernames, passwords, bank details, or personal data—by pretending to be someone you trust. The word “phishing” plays on “fishing”: attackers cast out bait (emails, messages, or fake websites) and wait for people to bite.

Attackers often impersonate banks, universities, employers, tech companies (e.g. Microsoft, Google), or delivery services. They create a sense of urgency (“Your account will be locked”, “Verify within 24 hours”) so you act quickly without checking. The goal is usually to steal credentials, install malware, or persuade you to send money or data.

Common types

  • Email phishing – Fake emails that look like they come from a real organisation, with links to fake login or payment pages.
  • Spear phishing – Targeted at a specific person or organisation using personalised information to seem more credible.
  • Smishing – Phishing via SMS or messaging apps.
  • Vishing – Phishing by voice (phone calls pretending to be IT support or your bank).
  • Clone phishing – A copy of a real email you might have received, but with a malicious link or attachment.

How attackers do their thing

Criminals follow a repeatable playbook. Understanding it helps you recognise when you are being targeted.

1. Reconnaissance

They gather information about you or your organisation: job titles, email addresses, social media, and past breaches. This makes messages feel personal and relevant.

2. Impersonation

They pretend to be a trusted sender: your university, bank, IT team, or a well-known brand. They copy logos, wording, and sometimes real email headers to look legitimate.

3. Bait and hook

They create a reason for you to act: “Your timetable has been updated”, “Unusual login to your account”, “Verify your details or lose access”. The message is designed to trigger curiosity or fear so you click without thinking.

4. Fake destinations

Links in the email or message go to fake websites that look like the real thing. Once you enter your username, password, or card details there, the attacker captures them. Sometimes the link downloads malware instead.

5. Harvest and abuse

Stolen credentials are used to access your accounts, steal more data, send more phishing from your address, or sell the data on the dark web.

Typical flow: You get an email that looks like it’s from “IT Support” saying your password will expire. You click the link, land on a page that looks like your university login, and enter your details. The attacker now has your credentials and can log in as you.

Famous phishing attacks from the past

Real-world incidents show how effective and damaging phishing can be—and why awareness matters.

2016 Democratic National Committee (DNC) hack

Staff received spear-phishing emails that looked like Google security alerts. When they entered their passwords on fake Google login pages, attackers gained access to thousands of emails. The breach had major political and policy consequences.

Target and retail breaches

In several high-profile cases, attackers first phished or stole credentials from contractors or employees. Those credentials were then used to get into company networks and steal customer payment data. One weak link (a phished employee) can expose an entire organisation.

Colonial Pipeline (2021)

A single compromised password (reportedly from a legacy VPN account that did not use multi-factor authentication) allowed ransomware attackers to get inside. The pipeline was shut down for days, affecting fuel supply. Phishing or leaked credentials are often the first step in such attacks.

University and education sector

Universities are frequent targets: fake “timetable update” or “scholarship” emails, fake login pages for student portals, and impersonation of IT or finance. Stolen university credentials can give access to research, personal data, and further attacks on partners and suppliers.

These examples underline the same lesson: one clicked link or entered password can lead to large-scale harm. Training and caution are essential.

What to check before entering your data

Before you type your username, password, or any personal or financial information anywhere, run through these checks. If anything feels off, stop and verify through a known, trusted channel.

1. Check the URL

  • Look at the address bar. Is it the real domain? For example, the real university site might be university.ac.uk—not university-login.xyz or university-secure.com.
  • Hover over links in emails (without clicking) to see where they actually go. The visible text can say “university.ac.uk” while the real link points to a phishing site.
  • Watch for typos: gooogle.com, microsft.com, amaz0n.com.

2. Check the sender

  • Does the email address match the organisation? A message “from” your bank is suspicious if it comes from randomname@gmail.com or a long, odd domain.
  • Display names can be faked. Always look at the actual email address, not just the name shown.

3. Urgency and pressure

  • Phishing often uses urgent language: “Act now”, “Your account will be locked”, “Reply within 24 hours”. Legitimate organisations usually allow you to verify through their official website or phone number.
  • If you are unsure, do not click. Go to the organisation’s site by typing the URL yourself or using a saved bookmark.

4. Requests for sensitive data

  • Real IT or banks rarely ask you to send your full password by email or to “confirm” it on a page you reached from a link in an email.
  • Be especially cautious with any request for passwords, PINs, one-time codes, or card details.

5. Use multi-factor authentication (MFA)

Even if an attacker gets your password, MFA (e.g. a code on your phone or an authenticator app) can block them from signing in. Turn on MFA for email, university accounts, and banking where possible.

Golden rule: When in doubt, do not click the link and do not enter your data. Contact the organisation using details you find yourself (e.g. from their official website or a known phone number), not from the suspicious message.

6. Try the URL / domain checker

Paste a link or domain into the URL / domain checker for an automated risk indication (typosquatting patterns, brand-in-domain tricks, HTTP vs HTTPS, optional DNS check). It is a teaching aid — not a guarantee — so still verify with official channels.

Statistics and impact

Phishing is one of the most common and costly forms of cyber crime. A few figures help put the risk in context.

Scale of the problem

  • Phishing and related social engineering are a leading cause of data breaches and ransomware. Many incidents start with a single phished credential or a clicked link.
  • Reports from agencies and vendors consistently rank phishing in the top categories of incidents (e.g. FBI IC3, Verizon DBIR). Attack volume continues to rise.
  • Education and healthcare are among the sectors most targeted, partly because of the value of personal and research data and the number of users who may be less familiar with security practices.

Why awareness matters

Technical defences (email filters, MFA, secure gateways) reduce risk but cannot block every phishing attempt. Attackers constantly adapt. Human vigilance—checking senders, URLs, and avoiding rushed decisions—remains essential. Training and safe simulations (like those on this site) help people recognise real attacks when they occur.

How to report phishing

If you receive a suspicious email or message, do not click links or open attachments. Report it so others can be protected.

  • At work or university: Use your organisation’s “Report phishing” or “Report spam” option (often in the email client or portal). Forward the message to your IT or security team if they have a dedicated address.
  • In the UK: Forward suspicious emails to report@phishing.gov.uk (NCSC).
  • General: Many email providers let you “Report phishing” from the message menu. This helps improve filters and protect other users.

After reporting, delete the message if your policy allows. Do not reply or click any links. If you have already entered data on a suspicious page, change your password on the real site (typed in yourself) and enable MFA. If it was a work or university account, inform IT immediately.

Run a simulation

Try safe, controlled phishing-style pages to see how realistic they can look. Every simulation shows a clear warning banner and never sends or stores any data.

URL / domain checker

Enter a website URL or domain to get an automated risk assessment (heuristic rules + optional public DNS lookup). Useful for demonstrating how fake links can be analysed; results are indicative only — see disclaimers on the tool page.

Open URL / domain checker →

Core flows

Simulation scenarios

Each scenario uses a realistic-looking page with a safe-simulation banner. No data is ever sent. After you interact, you are redirected to the educational debrief.

University sign-in fake page

Fake university login (identifier then passphrase). Mimics institutional sign-in so you can see how phishers copy real pages.

Try simulation

Instagram-style login

Fake login page mimicking a social platform. “Unusual login” email → click → login form (with banner) → redirect to debrief.

Try simulation · Email template

Password reset fake page

Fake “Reset your password” page. “Password reset requested” email → click → reset form (with banner) → redirect to debrief.

Try simulation · Email template