Posted on February 12, 2020 by Louise Howland
A phishing email is a fraudulent email that attempts to scam you by looking like an email from a legitimate business or person. A phishing email tries to get you to let your guard down and give access or information to cyber criminals. They are often designed and written in a way that looks like an official email that requires urgent attention. Good phishing emails look like the real thing. So how do you spot one?
Spotting a phishing email is an important skill to master, because phishing accounts for 90% of data breaches. Once hit, 15% of people successfully phished will be targeted at least once more this year.
A few years ago, I received an invoice from Apple for something I hadn’t purchased. My immediate reaction was panic. I thought someone had hacked into my Apple account, and now they were happily spending my money. But, as I hovered over the cancel subscription link on the email, something made me pause and take a second look.
On the face of it, it looked like an email from Apple, but as soon as I looked a little deeper I noticed more and more things that didn’t add up. My cybersecurity awareness training kicked in and I realised it was a phishing email.
This is the phishing email that was sent to me. Check out the differences between a legitimate email from Apple Inc. and a phishing email from a hacker masquerading as Apple Inc.
*Please note that I have blurred out my personal details in all images
On the left is the real invoice from Apple and on the right is the phishing email. On the surface they look very similar but I found nine differences.
The address the email came from was suspicious and the subjects were different.
On the legitimate Apple email all the hyperlinks are in light blue with no underline. In the phishing email they are a darker blue and all underlined.
On the real Apple email they list my email address and home address. The phishing email only has my email address – as I assume the hackers don’t know my home address.
On the real Apple email there is a hyperlink to use if you have questions about your bill. This sentence is missing completely from the phishing email.
The password preferences hyperlink; on the real email the hyperlink is part of the sentence, in the phishing email it is below the text.
This is lazy even for a hacker; spelling errors are an obvious red flag. Normal emails are proofread and carefully edited. Phishing emails are not.
Firstly, the wording around cancelling your purchase on the real email is very different from the phishing email. Apple offers you three links to click to contact them. The phishing email gives you one. In simple terms, this increases the likelihood that you will click it.
Secondly, the hyperlink for ‘Manage/Cancel Subscription’ on the phishing email is different from all the other hyperlinks.
I didn’t click on the link for obvious reasons but I assume it would take you to a page that either encourages you to enter personal details (possibly including payment information) or it could be a malicious link that releases a virus onto your machine.
See below for what the link looked like when I hovered over it.
The last obvious difference I could see was the second Apple logo which was different on the two emails. Left is real, right is phishing.
At first glance this email was very convincing, it really takes a trained eye to spot the difference – these are far more sophisticated than emails from Nigerian Princes seeking to move £10m out of the country!
Once I delved a little deeper there were actually quite a few signs the email was not legitimate. Other phishing emails may only have one or two clues, so it is vital you are always vigilant when looking at your emails and if something doesn’t feel right, don’t click on it.
In 2020, phishing is becoming an increasing threat because of cyber criminal’s access to machine learning systems. This sophisticated technology means that phishing emails have become an automated process, meaning they are increasingly accurate and therefore believable. It’s thought that 2020 will see more phishing emails masquerading as:
Knowing how to spot a phishing email is no simple task. What ultimately stopped me from clicking on the link in my Apple email was my recent information security training. This helped me understand what to question and look for in a seemingly legitimate email.
A workforce aware of cybersecurity becomes a human firewall that adds another layer of protection to your IT infrastructure. If you would like to know more about infosec and how to formulate your own cybersecurity strategy, contact us to find out more.
Find our more about ramsac's cybersecurity services