6 Ways to Spot a Phishing Email (2024)

Posted by Steve B. on May 10, 2022 2:11:00 PM

Note: links in this article have been verified to be secure

Cyber criminals often look to capitalize on the confusion surrounding national events and crises, so the past couple years have pretty much been their dream come true.

According to the FBI, phishing was the most common type of cybercrime in 2021—and phishing incidents rose by 34 percent, from 241,324 incidents in 2020, to 323,972 incidents in 2021—resulting in over $44 million in total victim loss. So, why do the number of data breaches—specifically in regards to phishing scams—continue to rise each year? According to Verizon's 2022 Data Breach Investigations Report (DBIR), 82 percent of data breaches involve some sort of human or user-driven element, including falling for a phishing scam and providing your information to an untrustworthy source. Thankfully, many of these breaches can be avoided by understanding the common warning signs of a phishing message.

About 96% of phishing attacks arrive by email. Another 3% are carried out through malicious websites and just 1% via phone. The increase in phishing attacks means email communications networks are now riddled with cybercrime. Symantec research suggests that as recently as 2020, 1 in every 4,200 emails was a phishing email.

While all major email providers have security measures in place to prevent suspected phishing emails, cyber criminals continue to find new ways to disguise their intentions and slip through the cracks. As a result, common sense and a trained eye are still the best defenses against falling victim to a phishing scam.

Here’s are some common warning signs to look for if you suspect a phishing email:

6 Ways to Spot a Phishing Email (1)

  1. The sender's email address
    Cyber criminals take drastic measures to make their emails look legitimate. They know one of the first things a recipient looks at when opening an email is who it's from so they try to replicate familiar addresses. Often these addresses include a slight misspelling that can be overlooked if you don't pay close attention.
  2. It asks you to do something that seems out of the ordinary
    Trust your gut. If an email is asking you to do something that seems out of the ordinary, treat the message as suspicious. Confirm with the source that the message is legitimate before clicking on any links or responding with personal information.
  3. Contains typos
    Many phishing attempts originate from foreign hackers for whom English is a second language. As a result, many phishing emails contain typos, misspellings and clumsy wording.
  4. Asks for login credentials or personal information
    No reputable company will ever send you an email asking you for your password, credit card number, bank account information, or other personal information. A request to send this type of information via email is a strong sign of a phishing attempt.
  5. Makes a threat or promises extraordinary rewards
    Cyber criminals want you to react to their emails quickly before you have time to recognize the red flags. They will often include an element of urgency or consequence in their messages to motivate you to respond quickly and distract you from considering its legitimacy.
  6. Contains masked links
    The goal of many phishing emails is to get you to click on a link that will begin the installation of malware on your computer. If you ever have concerns about the legitimacy of an email, you can place your cursor over any hyperlinked text to see exactly what URL it will open. If the URL that is shown does not appear to fit with the hyperlinked text, it is likely a phishing scam.

A disturbing trend in phishing scams is the use of legitimate senders in e-mail messages. This can happen when a person who you may have already exchanged legitimate e-mails with has had their account hijacked by cyber-criminals. Since the cyber-criminals have access to a live email account, they can make phishing e-mails look quite authentic, even mimicking the writing style of the compromised account holder.

You can still use some of the techniques above to help set off your “scam-meter”, especially if you are being asked to do something that doesn’t feel right. Note, however, that phishing-emails from legitimate senders can appear personable and convincing.

If you receive an email you believe to be a phishing attempt, here’s what you should and shouldn’t do:

  1. DO NOT click any links or attachments, or provide the sender with any information as the security of your hardware and information could be compromised.
  2. Mark the email as spam. If you are using the Cincinnati Bell/altafiberweb-based email client (webmail2.cincinnatibell.net), you can click the Spam button that is available at the top of the screen. If you are using a mobile device, or another email client, select “Report as spam/junk” (or similarly named option). This will remove the email from your inbox and enable us to better identify and filter spam messages in the future.

If you responded to a suspected phishing email and believe your personal information (login credentials, Social Security number, financial information) has been compromised, or if you have clicked the link and/or already provided any information, you should scan your device for malware using your anti-virus/malware program. If you don't have anti-virus/malware program, see the section below about altafiber's Premier Internet offering. Also, change the passwords for any accounts you have logged into since clicking the link. Then, visit IdentityTheft.gov to see what steps you should take depending on what information may have been exposed.

Limit the reuse of passwords - Scammers will reuse passwords they compromise or obtain through the dark web to attempt additional fraud or data theft. You should pick a strong password for your altafiberemail account and not reuse it on other websites. Strong passwords should be at least 8 characters and contain upper and lower case alphabetic characters, numbers and special characters.

Ensure your mobile device is using e-mail encryption – To ensure your altafiber email account is secure on your mobile device make sure encryption is enabled. You can easily enable encryption on your mobile device by checking the server settings in your mobile email client. If no security type or option is selected, enable TLS (accept all certificates).

Topics: Security

6 Ways to Spot a Phishing Email (2024)

FAQs

What are 5 ways you spot a phishing email? ›

Frequently Asked Questions
  • Urgent action demands.
  • Poor grammar and spelling errors.
  • An unfamiliar greeting or salutation.
  • Requests for login credentials, payment information or sensitive data.
  • Offers that are too good to be true.
  • Suspicious or unsolicited attachments.
  • Inconsistencies in email addresses, links and domain names.

How many ways can you spot a phishing email? ›

Here are some ways to recognize a phishing email: Urgent call to action or threats - Be suspicious of emails and Teams messages that claim you must click, call, or open an attachment immediately. Often, they'll claim you have to act now to claim a reward or avoid a penalty.

What are the red flags of phishing emails? ›

Sense of urgency or threatening language. Unfamiliar or unusual senders or recipients. Spelling or grammar errors. Request for money or personal information.

What is phishing 5 points? ›

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine.

What are the four 4 common techniques of phishing and spear phishing? ›

4 Common Phishing Techniques
  • Email Phishing. This is a cyber attack that uses email as a method of contacting potential victims. ...
  • Vishing. Phishing that resorts to scams via a phone call is called vishing. ...
  • Smishing. Smishing uses text messages (SMS) to send its malicious link. ...
  • Spear Phishing.

Which is an indicator of a phishing email? ›

Generic signatures and a lack of contact information are also strong indicators of phishing emails. Legitimate organizations generally provide their contact information. If there is no phone number, email address, or social media links in the signature block, the email is almost always fake.

What is the most common method of phishing? ›

Email phishing is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email addresses they can obtain. The email usually informs you that there has been a compromise to your account and that you need to respond immediately by clicking on a provided link.

What are the methods of phishing email detection? ›

Artificial intelligence (AI) and machine learning (ML) models can be trained to analyze the text of an email or the websites that it points to. These models will identify common red flags of phishing attacks, such as misspellings, attempts to coerce the recipient, and URL structure and targets.

What are examples of phishing emails? ›

An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website, and the stolen credit card information is used to commit further crimes.

What makes an email a phishing email? ›

Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging. The attacker's goal is to steal money, gain access to sensitive data and login information, or to install malware on the victim's device.

What is the warning of phishing email? ›

Email Scams: Recognizing them

The message has an unusual “From” address or an unusual “Reply-To” address. The (malicious) website URL doesn't match the name of the institution that it allegedly represents. The message is not personalized.

What are the three main types of malicious phishing emails? ›

Cybercriminals use three primary phishing techniques to steal information: malicious web links, malicious attachments and fraudulent data-entry forms.

What blocks phishing emails? ›

Use email security protocols.

Email authentication methods like SPF, DKIM, and DMARC records help verify the source of an email. Domain owners can configure these records to make it difficult for attackers to impersonate their domains in a domain spoofing attack.

What is a generic greeting for phishing? ›

Generic Greetings: Some email scams will include your first name in a message, but a lot of the time scammers don't. Phishing emails often use impersonal greetings like “Dear Customer/Client” instead of addressing you by your name.

What would be a key indicator of a phishing email? ›

An immediate sign that you're reading a phishing email comes from the greeting. Generic greetings like 'Dear Sir/Customer' or 'Hello Sir/User' are indicators of a phishing email. Legitimate organizations usually address you by your name, such as 'Dear John.

What are some common phishing tactics? ›

Common Phishing Attacks
  • Email Phishing. Most phishing attacks use email. ...
  • Spear Phishing. Spear phishing is when a cybercriminal sends a harmful email to a specific person that includes personal information to better trick them. ...
  • Smishing & Vishing. In smishing, scammers send text messages. ...
  • Angler Phishing.

Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 6591

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.