Attachment lure
You just clicked a phishing link.
Good news — this was a simulated phishing test run by your IT team. No malware was delivered. Attachments and "preview this document" links are a common way attackers harvest credentials or drop malware.
What to look out for next time
-
Be suspicious of any unexpected document, invoice, or shared file — especially if it asks you to sign in to view it. Genuine SharePoint and OneDrive shares appear in your Microsoft 365 Recent files, not just in email.
-
Macros in Office documents are almost never required for legitimate business. If a file demands "Enable Editing" or "Enable Content" before you can read it, close it and report.
-
PDFs and HTML attachments can contain phishing forms too — not just executables. Treat any attachment-driven login prompt with the same scepticism as an email link.
Strengthen your team's phishing defence
This sample page is part of our managed security awareness service. Branded landing pages, 100+ phishing templates, automated remedial training, and ISO 27001 A.6.3 evidence — all run for you.
Showing this to a prospect? See all four variants on the sample landing pages index.