We’ve all received spam and phishing emails — our inboxes are often full of them. They let us know that our package is being delivered (even when we haven’t ordered anything), provide details on our “recent” tax filing (that was completed months ago), and encourage us to act fast and enter our credit card — or risk missing out on limited time special offers and cash prizes..
Unfortunately, victims who unknowingly provide their personal details to fraudsters through phishing emails often face severe repercussions, such as identity theft and fraud. According to phishing statistics from AAG, an estimated 3.4 billion spam emails are sent every day. Furthermore, over 48% of all emails sent in 2022 were spam.
Yet even more alarmingly, ProofPoint’s latest 2023 State of the Phish report revealed some shocking data points users on the receiving end of phishing emails: 44% of users think an email is safe when it contains familiar branding, while another 63% of users don’t know that an email link text might not match the website it goes to.
In light of these data points, I thought I’d tell the story of some spam that was delivered into my own inbox and share some steps you can take to recognize (and avoid) phishing emails.
Before we get started, it might make sense to quickly define what phishing is in the first place.
Phishing is the deceptive practice used to acquire sensitive personal identification information by pretending to be a trustworthy entity. Fraudsters often portray themselves as well-known brands, banks, internet service providers, retail companies, or other services to gain the victim’s trust.
The ultimate goal of a phishing attack is to steal sensitive data from an individual — for example, usernames, passwords, credit card details, Social Security Numbers (SSN), bank account details, email addresses, phone numbers, or even answers to secret questions.
Knowing how to identify malicious phishing emails is the first step in preventing one of those emails from infecting your device or redirecting you to a landing page designed to steal your data.
Let’s take a look at one such example delivered directly to my email address.
At first glance, this might seem like a valid email. It leverages a recognizable logo and even applies brand colors to the email template.
However, there are a couple of red flags that help us identify that the email is in fact a bit phishy. Let’s take a look at some telltale signs.
Phishing emails often contain at least one of the following red flags.
Sure, it’s always possible that Marketing is just having a bad hair day when you receive a branded email with a bunch of typos. But more often than not, spelling mishaps and bad grammar are a pretty good tell that the email is not from a reputable sender.
In this case, multiple typos, spacing issues, and strange grammar were immediately visible in the subject lines and email body. So, always take a minute to thoroughly read through an email before you begin engaging with it.
Legitimate organizations definitely won’t be sending emails from unverified domains, as seen in the example below.
You can check your email headers to verify the details. The specific steps to check full email headers will depend entirely on your email application. You can find comprehensive instructions to check headers for the most common email applications at mxtoolbox. But, we’ve provided steps for the popular Gmail client below.
As seen in both screenshots above, the sender’s email address clearly does not belong to UPS.
Sketchy looking email? Hover before you click!
You can quickly check the URL destination by hovering over a button in your email client. In this case, the link destination definitely wasn’t for the UPS website.
For example, this link in our suspicious email uses a base64 encoded destination. When decoded we see the following.
Modifying any of those digits will redirect us to any number of random websites.
Look before you leap! Legitimate companies won’t email or text you links encouraging you to take prompt actions to update your payment information (or accept a package).
According to this phishing email example, however, the user must enter a code to receive a package that is “waiting for delivery”. Definitely a bit suspicious; this may be an attempt to make the email seem valid, or the scammers may be hoping that we would enter a valid tracking ID so that they could take control of that delivery.
A reputable business will never require you to download a file directly from an email. They will typically redirect you to their official website, where you can securely download any required documents. Refrain from opening email attachments, even if they appear to originate from a “trusted” organization.
Recognizing the signs of a phishing email greatly reduces the risk of falling prey to malicious cyber attacks. Pay attention to details such as typos in content and subject lines, mismatched email addresses and domain names, and suspicious links. And be extra wary of emails that pressure you to update your information, click on links, or take quick action.
It is becoming increasingly common for spam and phishing emails like the example above to be submitted to websites via contact forms on the site. When those messages are submitted, they are often delivered to a mailbox configured to receive form submissions. If such an email is delivered from your site, then the headers may not display the original sender’s details but may instead display your mail server information.
Hacked websites are commonly used to send out mass phishing and spam campaigns. If you have reason to believe that your website is the source of spam or phishing emails, immediate action should be taken to investigate and stop any potential damage.
And as always – if you believe your website has been compromised and you need a hand, we’re always happy to help clean up malware!