Posted on September 2, 2019 by Louise Howland
Can you identify a phishing email from the real thing?
A few years ago, I received an invoice from Apple for something I hadn’t purchased. My immediate reaction was panic. I thought someone had hacked into my Apple account, and now they were happily spending money on my account. But, as I hovered over the cancel subscription link on the email, something made me pause and take a second look.
On the face of it, it looked like an email from Apple but as soon as I looked a little deeper I noticed more and more things that didn’t add up. My information security awareness training kicked in and I realised it was a phishing email.
Spotting a phishing email is an important skill to master because phishing accounts for 90% of data breaches. And once hit, 15% of people successfully phished will be targeted at least once more this year. Here are a few tips for how you can identify a phishing email.
A phishing email is a fraudulent email that attempts to scam you by looking like an email from a legitimate business or person. A phishing email tries to get you to let your guard down and give access or information to cyber criminals. They are often designed and written in a way that looks like an official email that requires urgent attention.
Good phishing emails look like the real thing. So how do you spot one? Here’s an example of how, with the benefit of training, I avoided putting my data and my company’s network at risk.
Here’s the phishing email that was sent to me. Check out the differences between a legitimate email from Apple Inc. and a phishing email from a hacker masquerading as Apple Inc.
Here are the two emails side by side. (I have blurred out my personal details)
On the left is the real invoice from Apple. On the right is the phishing email. On the surface they look very similar but I found 9 differences.
The address the email came from was suspicious and the subjects were different.
On the legitimate Apple email all the hyperlinks are in a light blue with no underline. In the phishing email they are a darker blue and all underlined.
On the real Apple email they list my email address and home address. The phishing email only has my email address (as I assume the hackers don’t know my home address). I have blurred out my personal information.
On the real Apple email there is a hyperlink for if you have questions about your bill this sentence is missing completely from the phishing email.
Password preferences hyperlink. On the real email the hyperlink is part of the sentence, in the phishing email it is below the text.
This is lazy even for a hacker. Spelling errors are an obvious red flag. Normal emails are proofread and carefully edited. Phishing emails are not.
Firstly, the wording around cancelling your purchase on the real email is very different from the phishing email. Apple offers you three links to click to contact them. The phishing email gives you one. This increases the likelihood that you will click it.
Secondly, the hyperlink for Manage/Cancel subscription on the phishing email is different from all the other hyperlinks.
I didn’t click on the link for obvious reasons but I assume it would take you to a page that either encourages you to enter personal details (possibly including payment information) or it could be a malicious link that releases a virus onto your machine.
See below for what the link looked like when I hovered over it. (all I have blurred out of this image is my personal email address)
The last obvious difference I could see was the second Apple logo which was different on the two emails. Left is real, right is phishing.
At first glance this email was very convincing, it really takes a trained eye to spot the difference – these are far more sophisticated than emails from Nigerian Princes seeking to move £10m out of the country!
Once I delved a little deeper there were actually quite a few signs the email was not legitimate. Other phishing emails may only have one or two clues so it is vital you are always vigilant when looking at your emails and if something doesn’t feel right, don’t click on it.
What really stopped me from clicking on the link was my recent information security training. It helped me understand what to look for and question in a seemingly legitimate email.
A workforce, aware of cybersecurity, becomes a human firewall that adds another layer of protection to your IT infrastructure.
If you would like to know more about infosec and how to formulate your own cybersecurity strategy, contact us to find out more.
Find our more about ramsac's cybersecurity services