Skip to main content

What To Look Out for in Phishing Emails

Phishing emails try to trick recipients into revealing credentials, installing malware, or transferring money. Attackers use urgency, impersonation, and fake links. Train yourself to pause, inspect, and verify before clicking or replying.


Red Flags to Look for in Phishing Emails

Sender & Identity

Display Name VS. Real Address: An email might be from IT-ServiceDesk <servicedesk@actiontarget.com> -- ensure to hover or view the full address to ensure it is a legitimate email.

Spoofed Domains: If you are skeptical of an email, ensure to check the email address and make sure it is the correct email address. 

Ex) account-security@amaz0n.com VS. account-security@amazon.com                                                                                              The first email address has a '0' instead of an 'o'. This is a solid way of determining if you are experiencing a phishing attack. If you are still uncertain, reach out to the IT department for help.

Reply-to is Different: The sender could be bob@actiontarget.com but the reply-to is timmy@gmail.com.

Content & Social Engineering

Urgency & Threats: "Your account will be deleted in 24 hours unless you verify"

Too good to be true: "You won $5,000 - Click to claim"

Unrequested Attachments: Attachments asking you to enable macros; opening can run malware on your device.

Spear-phish signs: Uses your co-worker's, manager's, or an executive's name or specific project details to get information

Attachments & File Types

 

Visual & Language Cues

 


Realistic Examples


What to do if you suspect phishing