You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DECEIVER is a free, interactive, and immersive social engineering training platform designed to equip employees with the knowledge and skills to identify, resist, and report social engineering attacks. The platform covers 8 attack vectors, 6 live simulations, and real-world case studies to ensure comprehensive training.
✨ Key Features
🎭 6 Interactive Training Modules
Module
Focus
Description
01 — Attack Dossiers
Threat Intelligence
Classified files on 8 social engineering attack vectors with tactics, red flags, real-world cases, and defenses
02 — Live Simulations
Decision Training
6 realistic scenarios where you must make the right security decision under pressure
03 — Red Flag Detector
Pattern Recognition
Interactive email and SMS samples — click on every suspicious element to train your eye
04 — Psychology Lab
Human Factors
Deep dive into Cialdini's principles of influence and how attackers weaponize them
05 — Defense Playbook
Security Protocols
Verification matrix, critical protocols, and 10 red flags — printable reference
06 — Knowledge Quiz
Assessment
12-question quiz with detailed explanations to reinforce learning
📊 Module 01: Attack Dossiers
8 Social Engineering Attack Vectors
#
Attack
Category
Threat Level
Color
01
Phishing
Email-Based Attack
🔴 CRITICAL
#c0392b
02
Vishing
Voice-Based Attack
🔴 HIGH
#7c3a1e
03
Smishing
SMS-Based Attack
🔴 HIGH
#4a1a6e
04
Pretexting
Identity Deception
🔴 CRITICAL
#1a3a5c
05
Baiting
Physical/Digital Lure
🟡 MEDIUM
#1a4a2e
06
Tailgating
Physical Intrusion
🔴 HIGH
#5c4a1a
07
Quid Pro Quo
Service Exchange
🟡 MEDIUM
#4a2c1a
08
Watering Hole
Web-Based Targeted
🔴 CRITICAL
#1a3a3a
Dossier Contents 📁
Attack Methodology: 5-step breakdown of how attackers execute each vector
Red Flags: 7+ specific indicators to recognize in the wild
Real-World Cases: 4 historical examples with year and financial impact
Defenses: 6+ actionable countermeasures for organizations and individuals
Real-World Case Examples
Google & Facebook BEC — $121M stolen via fake invoices
MGM Resorts Hack — $100M loss from a single helpdesk call
Robinhood Breach — 7M accounts exposed via vishing
Stuxnet Delivery — Air-gapped nuclear facility breached via USB baiting
🎮 Module 02: Live Simulations
6 Realistic Scenarios
#
Type
Title
Decision Points
01
Phishing Email
CEO Wire Transfer Request
Urgency, authority, look-alike domain
02
Vishing Call
IT Helpdesk Password Reset
Authority, fear, ticket number credibility
03
Smishing
Bank Account Alert
Fake domain, urgency, personalization
04
Pretexting
The New Employee Audit
Compliance pressure, data dump request
05
Baiting
The Parking Lot USB
Curiosity, labeled bait, physical media
06
Quid Pro Quo
The IT Support Call
Helpfulness exploitation, remote access
Simulation Features 🎯
Immersive interfaces:
📧 Email client with chrome toolbar
📞 Voicemail player with transcript
📱 Phone UI with SMS bubbles
Multiple choice decisions with letter indicators (A/B/C/D)
Immediate feedback with detailed explanations
Score tracking (0/6 correct decisions)
Visual indicators for passed/failed scenarios
Next scenario navigation
Sample Decision Point
YOUR DECISION
You receive an email from the CEO requesting an urgent wire transfer on Friday afternoon.
What do you do?
[A] Process immediately — it's the CEO
[B] Reply asking for more details
[C] Verify by calling the CEO's known cell number; report to IT Security ✓
[D] Forward to the out-of-office CFO
🔍 Module 03: Red Flag Detector
Training Samples
Sample
Type
Flags
Description
BEC Email
Email
6 flags
Business Email Compromise sample with domain spoofing, urgency, fear tactics
Smishing SMS
SMS
5 flags
Bank impersonation text with fake domain, engagement trap
Interactive Features ✨
Clickable red flags — every suspicious element is highlighted
Progressive discovery — flags stay found once clicked
Real-time counter showing found/total flags
Detailed explanations for each flag when discovered
Visual feedback with found indicators (⚑)
Red Flag Examples
m.cheng@digitech-corp.net — Domain spoofing (digitech-corp.net vs digitech.com)
🎭 DECEIVER — Transform Security Awareness from Boring to Unforgettable 🎭
Last updated: March 2025
About
DECEIVER is an immersive social engineering awareness training platform designed to educate employees and security professionals on the psychology and tactics behind human-targeted cyberattacks. Featuring 8 attack dossiers, 6 live simulations, a red flag detector, psychology lab, defense playbook, and knowledge quiz - all classified📚.