The one where a fake email proved the risk was real
A fake onboarding email opened a real security gap, showing how even mature defences fail when assumptions go untested.
A fake onboarding email opened a real security gap, showing how even mature defences fail when assumptions go untested.

A new hire’s first week is meant to be about learning, not defending.
For one of the world’s largest B2C retailers, it became the starting point of a simulated breach that revealed how a single overlooked detail could open the entire network.
Their defenses were mature, with a global SOC, internal red teams, and certified processes built around ISO 27001.
However, maturity alone doesn’t equal immunity. They wanted to know if their systems could withstand an attack from the outside, one that mirrored the persistence of a real adversary.
This is the story of how a single phishing email exposed the hidden gap between perceived and actual security.
Our brief was clear: act as an external APT with no insider knowledge and see how far we could get.
No code access. No architecture documentation. No hints.
Our approach mirrored how a genuine threat actor would operate, testing not just technology but human response.
A new employee, still in the onboarding process, received a CovertSwarm phishing email. Believing it to be part of an internal workflow, they clicked. In that moment, we captured valid credentials and MFA tokens.
The employee realised their mistake quickly and reported it. The organisation responded in line with procedure. Accounts were locked and credentials reset.
But one small oversight remained.
The VPN session established during the phishing attack stayed active, giving us an open channel into the network. From there, we moved laterally and explored deeper.
When we reached the company’s Citrix environment, an unauthenticated application revealed a weakness that allowed remote code execution. Within moments, our Command and Control infrastructure was active inside their estate, operating silently and unseen.
From a single phishing click, we had reached critical systems without detection.
The client’s defensive tools were in place but not fully aligned to catch this type of intrusion.
Our activity went unnoticed, showing that even well-structured incident response plans can falter when a live attack behaves differently from the model they were built to counter.
The lesson wasn’t about a single misstep, but about how complex systems can create blind spots that only constant, real-world testing can uncover.
This global retailer discovered that no security strategy is complete without ongoing validation. A single phishing email can bypass even the most advanced systems if assumptions are left untested.
Every organization faces the same truth. If we can find the gap, a real attacker eventually will.
Make our attack your best defense.
Contact CovertSwarm today and see your security through an adversary’s eyes.
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from the CovertSwarm experts.
Weaponized patience: the strategic implications of the F5 breach
The F5 breach reveals the growing danger of shared infrastructure attacks. As adversaries learn faster than defenders, the only path to resilience is continuous, adaptive testing.…
Everyone has a plan until they get punched in the face: reflections on the NCSC 2025 annual review
The NCSC Annual Review 2025 delivers a reality check. Highly significant cyber incidents have increased by 50 percent year over year. It’s time to act.
Part 3: CBEST Series – The Future of Threat-Led Penetration Testing
Regulated testing like CBEST is pivotal, but as threats shift, organizations must adopt more strategic, agile threat-led penetration testing. Discover what’s next.