Simulate phishing attack response scenarios