Blog

How to Spot a Phishing Email: 15 Warning Signs & Real Examples 2024

JP
John Price
January 27, 2024
Share

Phishing emails represent the #1 initial attack vector for cyber criminals—responsible for 90% of data breaches and costing organizations an average of $4.91 million per successful attack. Despite growing awareness, phishing attacks succeed because modern techniques have become increasingly sophisticated, mimicking legitimate communications with remarkable accuracy. This comprehensive guide teaches you how to identify phishing emails through 15 concrete warning signs, provides real-world phishing examples, explains what to do if you've already clicked a malicious link, and offers strategies for training teams to recognize and report phishing attempts before damage occurs.

What is a Phishing Email? Quick Definition

A phishing email is a fraudulent message designed to trick recipients into revealing sensitive information (passwords, credit cards, Social Security numbers), clicking malicious links, or downloading malware. Phishing emails use spoofing to impersonate trusted entities—banks, employers, government agencies, popular services—exploiting trust through social engineering tactics to manipulate victims into compromising actions.

Common phishing goals:

15 Warning Signs: How to Identify Phishing Emails

1. Urgent or Threatening Language

What to look for: Emails creating artificial urgency or fear

Examples:

Why attackers do this: Urgency bypasses critical thinking, prompting hasty action

Reality check: Legitimate companies rarely threaten immediate account closure via email

2. Suspicious Sender Email Address

What to look for: Email address not matching legitimate domain

Deceptive techniques:

How to check: Click sender name to reveal full email address; hover over "Reply" button showing reply-to address

3. Generic Greetings

What to look for: Impersonal salutations

Red flag greetings:

Why it matters: Legitimate companies use your name from their customer database

Exception: Some legitimate bulk emails use generic greetings, so combine with other red flags

4. Spelling and Grammar Errors

What to look for: Typos, awkward phrasing, grammatical mistakes

Examples:

Why it happens: Many phishing campaigns originate from non-English speakers; legitimate companies have professional editing

Modern caveat: AI-powered phishing emails increasingly have perfect grammar

5. Suspicious Links

What to look for: URLs not matching claimed destination

How to check safely:

  1. Hover without clicking: Desktop shows URL at bottom of browser
  2. Check domain carefully: Look for misspellings
  3. Shorten link expansion: Paste shortened URLs into URL expander tools
  4. IP addresses: Legitimate companies don't link to raw IPs (http://192.168.1.1)

Red flag examples:

6. Unexpected Attachments

What to look for: Unsolicited attachments, especially executable files

High-risk file types:

Rule: Never open unexpected attachments even from known senders (their account may be compromised)

7. Requests for Sensitive Information

What to look for: Emails asking for passwords, SSN, credit cards, account numbers

Golden rule: Legitimate companies NEVER request sensitive information via email

Examples:

8. Too-Good-to-Be-True Offers

What to look for: Unrealistic promises or prizes

Common lures:

Reality: You can't win contests you never entered; no one gives away free iPhones

9. Mismatched or Poor Quality Logos/Branding

What to look for: Low-resolution logos, incorrect colors, outdated branding

Examples:

10. Unusual Sender Behavior

What to look for: Colleagues or vendors communicating differently

Red flags:

11. Suspicious Attachments Names

What to look for: Generic or enticing file names

Examples:

12. Mismatched Reply-To Address

What to look for: Reply-to address different from sender

Check method: Click "Reply" and examine address that appears in "To:" field

Example: Email appears from support@amazon.com but replies go to randomuser@gmail.com

13. Requests for Immediate Action

What to look for: Pressure tactics with tight deadlines

Examples:

Defense: Take time to verify; legitimate urgent requests can withstand verification

14. Incorrect Company Information

What to look for: Wrong addresses, phone numbers, or company details

How to verify:

15. Suspicious Email Headers

What to look for (advanced): Email routing and authentication failures

Check headers for:

How to view: Most email clients have "Show Original" or "View Headers" option

Real Phishing Email Examples (Annotated)

Example 1: Fake PayPal Security Alert

Subject: "Unusual Activity - Verify Your Account Now"

Sender: security@paypa1-alerts.com

Content highlights:

Verdict: PHISHING - 5 major red flags

Example 2: Business Email Compromise (CEO Fraud)

Subject: "Urgent Wire Transfer Needed"

Sender: CEO Name (but from john.smith.ceo@gmail.com)

Content: "I'm in meetings all day but need you to wire $50,000 to this account for acquisition deal. I'll explain later. Confidential - don't mention to accounting."

Red flags:

Verdict: PHISHING (BEC type) - Call CEO directly to verify

Example 3: Fake Microsoft 365 Alert

Subject: "Action Required: Your Microsoft 365 mailbox is full"

Sender: Microsoft 365 Admin <no-reply@microsoft-office365.com>

Content: Professional Microsoft branding, message says mailbox reached 99% capacity, button says "Increase Storage"

Red flags:

Verdict: PHISHING - Sophisticated (good design) but fake domain

Example 4: Fake Shipping Notification

Subject: "Your Package Delivery Failed - Reschedule Now"

Sender: FedEx Delivery <tracking@fedex-delivery-notice.com>

Content: "We attempted delivery but no one was home. Click here to reschedule." Includes tracking number.

Red flags:

Verdict: PHISHING - Exploits expectation of package deliveries

What to Do If You Clicked a Phishing Link

Immediate Actions (Minutes 0-5)

  1. Disconnect from network: Turn off WiFi or unplug Ethernet immediately
  2. DO NOT enter any information: If you reach a fake login page, close it immediately
  3. Note the time: Document exactly when you clicked for incident response
  4. DO NOT turn off computer: Shutting down may execute malware

Short-Term Actions (Minutes 5-60)

  1. Alert IT security: Report immediately to security team
  2. Run antivirus scan: Full system scan for malware
  3. Check browser for extensions: Remove any unwanted browser add-ons
  4. Review downloads: Delete any files downloaded from phishing site

If You Entered Credentials (Critical)

  1. Change password immediately: From different device if possible
  2. Enable MFA: If not already enabled, activate two-factor authentication
  3. Check account activity: Review recent logins and changes
  4. Alert service provider: Contact bank/service if credentials entered
  5. Change related accounts: If you reuse passwords (don't do this!), change them everywhere

Follow-Up Actions (Hours-Days)

  1. Monitor for fraud: Watch bank statements, credit reports
  2. Security training: Learn from mistake—understand what you missed
  3. Update security software: Ensure antivirus and OS fully updated

Types of Phishing Emails

Spear Phishing

Target: Specific individuals with personalized content

Research: Attackers study targets via LinkedIn, social media

Example: Email referencing your actual projects, colleagues, or recent activities

Success rate: 10-20% (vs 3% for generic phishing)

Whaling

Target: Executives and high-level targets

Stakes: High-value targets with access to sensitive data/funds

Example: Fake legal subpoena targeting CEO

Clone Phishing

Method: Copy legitimate email you previously received, replacing links with malicious ones

Example: Resend of real Amazon order confirmation with link modified

Deception: Extremely convincing since content is real

Conversation Hijacking

Method: Attackers compromise email account, join ongoing conversation threads

Example: Invoice discussion between you and vendor; attacker sends fake invoice with different payment details

Why dangerous: Context makes it highly believable

Advanced Phishing Detection Techniques

Email Header Analysis

What to check in full headers:

Link Safety Checking

Tools to analyze suspicious links WITHOUT clicking:

Attachment Safety

Before opening attachments:

  1. Verify sender through secondary channel (phone call, text)
  2. Scan with antivirus before opening
  3. Open in sandboxed environment if suspicious
  4. Check file properties (right-click → Properties on Windows)

How to Report Phishing Emails

Internal Reporting (Your Organization)

  1. IT security team: Forward suspicious email to security@yourcompany.com
  2. Phishing button: Use email client's "Report Phishing" feature if available
  3. Document details: Save email with full headers
  4. Don't delete: Security team may need for investigation

External Reporting

Email Provider Reporting

Phishing Statistics: Understanding the Threat

Attack Frequency and Success Rates

Financial Impact

Training Employees to Spot Phishing

Effective Training Program Components

  1. Initial training: 30-45 minute session covering warning signs
  2. Simulated phishing: Monthly fake phishing tests measuring awareness
  3. Immediate feedback: Training page when employees click simulation
  4. Regular updates: Quarterly refreshers on new techniques
  5. Positive reinforcement: Reward employees reporting phishing
  6. Real examples: Share actual phishing attempts targeting organization

Training Topics to Cover

Measuring Training Effectiveness

Technical Defenses Against Phishing

Email Security Solutions

Browser Protection

Multi-Factor Authentication (MFA)

Why MFA matters: Even if phishing steals password, attacker can't access account without second factor

MFA options (best to worst):

  1. Hardware security keys (YubiKey) - phishing-resistant
  2. Authenticator apps (Google Authenticator, Authy)
  3. Push notifications (Duo, Microsoft Authenticator)
  4. SMS codes (weakest - vulnerable to SIM swapping)

Frequently Asked Questions

Can you get hacked just by opening a phishing email?

Generally no—simply opening/reading a phishing email typically won't compromise you. Modern email clients display emails in safe mode preventing automatic execution of malicious code. However, you CAN be compromised by: clicking links in the email, opening attachments, enabling macros in Office documents, or entering credentials on fake websites. Extremely rare exploits targeting email client vulnerabilities exist but are unusual. The danger is clicking, not just viewing.

Why do phishing emails have spelling errors?

Two reasons: 1) Many originate from non-English speakers with poor language skills. 2) Some errors are INTENTIONAL—filtering for gullible victims. Sophisticated users spot errors and ignore; those who proceed despite errors are more likely to fall for the scam completely, making them better targets for attackers' time investment.

Can phishing emails steal data without me doing anything?

Extremely rare but possible through zero-day exploits in email clients. However, 99.9% of phishing requires victim action—clicking link, opening attachment, entering credentials. Modern email security (HTML rendering restrictions, attachment sandboxing, JavaScript blocking) prevents automatic compromise from simply receiving an email. The vulnerability is human response, not the email itself.

Conclusion: Building Phishing-Resistant Culture

Phishing remains effective because attackers exploit human psychology more than technical vulnerabilities—urgency, authority, trust, fear, and curiosity drive victims to bypass security instincts. No technical defense is perfect; phishing emails bypass even advanced filters, making human awareness the critical defense layer.

Organizations building phishing resistance combine technical controls (email filtering, MFA, link protection) with ongoing security awareness training, simulated phishing testing measuring and improving awareness, clear reporting procedures making it easy to report suspicious emails, positive security culture where reporting is rewarded not punished, and rapid response investigating reported emails quickly.

The 15 warning signs in this guide provide framework for evaluation—suspicious emails typically exhibit multiple red flags. Trust your instincts; if something feels off, verify through independent channels before responding. Taking 2 minutes to verify via phone call beats suffering months of breach recovery.

subrosa provides comprehensive phishing defense including security awareness training with monthly simulated phishing campaigns, email security solutions detecting and blocking phishing before inbox delivery, incident response services for organizations suffering successful phishing attacks, managed detection and response monitoring for post-phishing malware and lateral movement, and security culture consulting building organizations where employees actively defend against social engineering. Schedule a consultation to discuss phishing defense for your organization.

Protect your organization from phishing attacks

Build a security-aware culture with training and simulated phishing campaigns that actually work.