Security Education

What To Do If You Clicked

A recovery lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.

You clicked a link. You entered your password. You realized it was phishing. Now what?

Do not panic. Act fast.

Scenario

A user clicked a phishing link and may have entered credentials or approved access. Time now matters more than perfect diagnosis.

Attack Chain

User clicks lure
  ↓
Credentials or session token are exposed
  ↓
Attacker attempts real sign-in
  ↓
Mailbox, cloud, or downstream systems become reachable

Observable Evidence

Look for:

  • the original phishing message or link
  • confirmation that credentials, MFA approval, or a file interaction occurred
  • new sessions from unknown locations or devices
  • forwarding rules, sent mail, or password resets after the click
  • endpoint alerts if a file was opened or executed

Operator Response

In the next 5 minutes

  1. Change the affected password immediately.
  2. Enable MFA if it is not already enabled.
  3. Revoke active sessions you do not recognize.

In the next 30 minutes

  1. Report the event with the email, link, account, and click time.
  2. Check for mailbox forwarding rules and unexpected sent mail.
  3. Notify recipients if the attacker already sent messages from the account.

In the next 24 hours

  1. Monitor for password resets, login alerts, and financial abuse.
  2. Run a malware scan if a file was opened or downloaded.

WitnessOps Controls

The governed response should use:

Speed matters more than perfection. The attacker is automated. Every minute counts.