TASKS
Security Education
What To Do If You Clicked
A recovery lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.
You clicked a link. You entered your password. You realized it was phishing. Now what?
Do not panic. Act fast.
Scenario
A user clicked a phishing link and may have entered credentials or approved access. Time now matters more than perfect diagnosis.
Attack Chain
User clicks lure
↓
Credentials or session token are exposed
↓
Attacker attempts real sign-in
↓
Mailbox, cloud, or downstream systems become reachable
Observable Evidence
Look for:
- the original phishing message or link
- confirmation that credentials, MFA approval, or a file interaction occurred
- new sessions from unknown locations or devices
- forwarding rules, sent mail, or password resets after the click
- endpoint alerts if a file was opened or executed
Operator Response
In the next 5 minutes
- Change the affected password immediately.
- Enable MFA if it is not already enabled.
- Revoke active sessions you do not recognize.
In the next 30 minutes
- Report the event with the email, link, account, and click time.
- Check for mailbox forwarding rules and unexpected sent mail.
- Notify recipients if the attacker already sent messages from the account.
In the next 24 hours
- Monitor for password resets, login alerts, and financial abuse.
- Run a malware scan if a file was opened or downloaded.
WitnessOps Controls
The governed response should use:
Speed matters more than perfection. The attacker is automated. Every minute counts.