Mitigate clones

This document covers the clone mitigation feature

Within our Premium and Enterprise plans we provide clone mitigation features. We offer different types of mitigations, depending on the site being protected. This page shows the different types of mitigations we offer. Mitigations are optionally and need to be enabled via the Dashboard.

Block user input

Once activated, this feature blocks victims from submitting any information to the phishing site. This proactive measure prevents victims from disclosing sensitive information, including usernames, passwords, and financial details.

This mitigation is compatible with all websites that include our personal link using HTML <script> tags.

Redirect users

If a victim visits a phishing page, this feature redirects the victim immediately to the real website. This prevents the user visiting the phishing site.

This mitigation is compatible with all websites that include our personal link using HTML <script> tags.

Microsoft 365 Warn users

Specifically for Microsoft 365 tenants, we offer a user warning mitigation. If a user visits a (AITM) phishing site and logs into your tenant, a warning is displayed that a phishing attempt has been detected:


Evidence gathering
Webhook support