How to spot a phishing email

ramsac phishing blog

Can you identify a phishing email from the real thing?

A phishing email is a fraudulent email that attempts to scam you by looking like an email from a legitimate business or person. A phishing email tries to get you to let your guard down and give access or information to cyber criminals. They are often designed and written in a way that looks like an official email that requires urgent attention. Good phishing emails look like the real thing. So how do you spot one?

How to Spot a Phishing Email

  1. Check the address and subject line
  2. Be suspicious of untidy design
  3. Look out for spelling mistakes
  4. If it’s too good to be true, it probably is
  5. Consider context. Were you expecting this email?
  6. Compare if you can
Spotting a phishing email is an important skill to master, because phishing accounts for 90% of data breaches. Once hit, 15% of people successfully phished will be targeted at least once more this year.

An example of an Apple phishing email

A few years ago, I received an invoice from Apple for something I hadn’t purchased. My immediate reaction was panic. I thought someone had hacked into my Apple account, and now they were happily spending my money. But, as I hovered over the cancel subscription link on the email, something made me pause and take a second look. On the face of it, it looked like an email from Apple, but as soon as I looked a little deeper I noticed more and more things that didn’t add up. My cybersecurity awareness training kicked in and I realised it was a phishing email. This is the phishing email that was sent to me. Check out the differences between a legitimate email from Apple Inc. and a phishing email from a hacker masquerading as Apple Inc. *Please note that I have blurred out my personal details in all images On the left is the real invoice from Apple and on the right is the phishing email. On the surface they look very similar but I found nine differences.

1. The address and subject line

The address the email came from was suspicious and the subjects were different. Spot the different between invoices

2. Email design and styling

On the legitimate Apple email all the hyperlinks are in light blue with no underline. In the phishing email they are a darker blue and all underlined. Spot the different between invoices

3. My details

On the real Apple email they list my email address and home address. The phishing email only has my email address – as I assume the hackers don’t know my home address. Spot the different between invoices

4 & 5. Changes from the usual email layout

On the real Apple email there is a hyperlink to use if you have questions about your bill. This sentence is missing completely from the phishing email. Spot the different between invoices The password preferences hyperlink; on the real email the hyperlink is part of the sentence, in the phishing email it is below the text. Spot the different between invoices

6. Spelling errors

This is lazy even for a hacker; spelling errors are an obvious red flag. Normal emails are proofread and carefully edited. Phishing emails are not. Spot the different between invoices

7 & 8. Limiting contact options

Firstly, the wording around cancelling your purchase on the real email is very different from the phishing email. Apple offers you three links to click to contact them. The phishing email gives you one. In simple terms, this increases the likelihood that you will click it. Spot the different between invoices Secondly, the hyperlink for ‘Manage/Cancel Subscription’ on the phishing email is different from all the other hyperlinks. I didn’t click on the link for obvious reasons but I assume it would take you to a page that either encourages you to enter personal details (possibly including payment information) or it could be a malicious link that releases a virus onto your machine. See below for what the link looked like when I hovered over it. Spot the different between invoices

9. The Apple logo

The last obvious difference I could see was the second Apple logo which was different on the two emails. Left is real, right is phishing. Spot the different between invoices

Knowing how to spot phishing scams

At first glance this email was very convincing, it really takes a trained eye to spot the difference – these are far more sophisticated than emails from Nigerian Princes seeking to move £10m out of the country! Once I delved a little deeper there were actually quite a few signs the email was not legitimate. Other phishing emails may only have one or two clues, so it is vital you are always vigilant when looking at your emails and if something doesn’t feel right, don’t click on it. In 2020, phishing is becoming an increasing threat because of cyber criminal’s access to machine learning systems. This sophisticated technology means that phishing emails have become an automated process, meaning they are increasingly accurate and therefore believable. It’s thought that 2020 will see more phishing emails masquerading as:
  • PayPal. There have been reports of PayPal users receiving email pertaining to ‘unfamiliar log-ins’ that request the user clicks a link to confirm their identity.
  • Employers. Some cyber attackers have sent emails to employees that look like they are from their company’s HR team, asking them to click a link to solve a problem with their salary payment.
  • Banks. The Hong Kong Monetary Authority have recently sent out an email warning HSBC account holders of a phishing email containing a link to an ‘e-Advice’ note detailing a recent payment.
Knowing how to spot a phishing email is no simple task. What ultimately stopped me from clicking on the link in my Apple email was my recent information security training. This helped me understand what to question and look for in a seemingly legitimate email.

Ensure your IT is at its strongest

Take back control with ramsac’s free self-assessment tool that helps to strengthen your business’ IT systems.

A workforce aware of cybersecurity becomes a human firewall that adds another layer of protection to your IT infrastructure. If you would like to know more about infosec and how to formulate your own cybersecurity strategy, contact us to find out more.

Related Posts

  • How to set up a secure password policy in Microsoft 365

    How to set up a secure password policy in Microsoft 365

    Cybersecurity

    Discover the essentials of a robust password policy for cybersecurity in Microsoft 365. Learn what to include and what to avoid. Read the blog today. [...]

    Read article

  • A guide to sensitivity labels and how to apply them

    A guide to sensitivity labels and how to apply them

    Cybersecurity

    Sensitivity labels allow you to manage, organise, and protect sensitive emails, files, and documents as part of the Microsoft 365 suite. Read on. [...]

    Read article

  • MFA vs 2FA: What’s the Difference?

    MFA vs 2FA: What’s the Difference?

    Cybersecurity

    Features like user facial recognition that are difficult to replicate means multi-factor authentication offers more cybersecurity layers than two-factor authentication. Find out more. [...]

    Read article

  • Happy Birthday secure+: How our cybersecurity solution has detected over 8000 cybersecurity alerts in one year

    Happy Birthday secure+: How our cybersecurity solution has detected over 8000 cybersecurity alerts in one year

    Cybersecurity

    secure+ has detected and responded to over 8000 security alerts in its first year [...]

    Read article

  • MFA Fatigue: Multi-Factor Authentication (MFA) is best practice, but it’s not risk free.

    MFA Fatigue: Multi-Factor Authentication (MFA) is best practice, but it’s not risk free.

    Cybersecurity

    MFA Fatigue is a problem organisations need to be aware of, in this blog we break down why and what organisations can do to combat it. [...]

    Read article

  • Data Protection Day – Protecting your information on social media.

    Data Protection Day – Protecting your information on social media.

    Cybersecurity

    The 28th of January is Data Protection day, to mark this day we have created a blog with tips on how people can keep their personal data safe on [...]

    Read article