Table of Contents
- What is Phishing?
- Why Phishing Attacks Are So Effective
- The 15 Most Common Phishing Red Flags
- How to Verify Email Senders
- Analyzing Suspicious Links
- Identifying Dangerous Attachments
- Types of Phishing Attacks
- Real-World Phishing Examples
- Step-by-Step Email Verification
- What to Do If You Receive Phishing
- I Clicked a Phishing Link, Now What?
- Technical Protections Against Phishing
- Employee Phishing Training
- Creating Effective Reporting Systems
- Frequently Asked Questions
- Conclusion
What is Phishing?
Phishing is a cyberattack technique where criminals send fraudulent emails impersonating trusted entities to manipulate recipients into:
- Revealing credentials: Entering usernames and passwords on fake login pages
- Transferring money: Processing fraudulent invoices or wire transfer requests
- Downloading malware: Opening infected attachments or clicking malicious links
- Disclosing sensitive data: Providing personal information, SSNs, financial details
- Granting system access: Approving illegitimate access requests or installing remote access tools
The Scale of the Phishing Problem
By the numbers:
- 3.4 billion phishing emails sent daily worldwide
- 90% of data breaches begin with phishing
- 1 in 99 emails is a phishing attack
- 30% of phishing emails are opened by targets
- 12% of targeted users click malicious links or open attachments
- $4.91 million average cost per successful phishing-related breach
- $17,700 average cost per minute of downtime from phishing attacks
- 94% of malware is delivered via email
Why Email Remains the Primary Attack Vector
Attackers prefer email phishing because:
- Universal access: Everyone uses email across all organizations
- Low cost: Sending millions of emails costs virtually nothing
- High returns: Even 0.1% success rate yields significant compromises
- Psychological manipulation: Email enables sophisticated social engineering
- Direct path: Compromising email often provides access to other systems
- Trusted medium: People expect to receive important information via email
- Bypass perimeter: Emails pass through firewalls to internal users
Why Phishing Attacks Are So Effective
Understanding why phishing succeeds helps defend against it:
1. Exploiting Human Psychology
Attackers manipulate fundamental psychological principles:
- Authority: Impersonating executives, IT departments, or government agencies
- Urgency: Creating artificial time pressure requiring immediate action
- Fear: Threatening account closure, legal action, or job consequences
- Curiosity: Offering enticing information or unexpected benefits
- Trust: Leveraging established relationships and familiar branding
- Greed: Promising rewards, prizes, or financial gains
- Helpfulness: Requesting assistance that seems reasonable
2. Sophisticated Targeting
Modern phishing attacks use extensive reconnaissance:
- Mining social media for personal information
- Researching organizational structures and relationships
- Timing attacks to match real events (tax season, earnings reports)
- Impersonating specific individuals with accurate details
- Understanding business processes and terminology
3. Technical Sophistication
Attackers use advanced technical techniques:
- Copying authentic email templates perfectly
- Registering lookalike domains (micros0ft.com, paypa1.com)
- Spoofing sender addresses to appear legitimate
- Using compromised legitimate accounts
- Hosting phishing pages on legitimate compromised sites
- Employing encryption (HTTPS) on phishing sites
- Defeating spam filters through constant adaptation
4. Volume and Persistence
The sheer scale ensures success:
- Billions of phishing emails daily
- Continuous campaigns testing different approaches
- Rapid adaptation when campaigns are blocked
- Patient targeting of high-value individuals over time
| Factor | How It Helps Attackers | Defense Strategy |
|---|---|---|
| Urgency | Bypasses careful analysis | Slow down, verify independently |
| Authority | Discourages questioning | Verify through known channels |
| Personalization | Builds false trust | Assume information is public |
| Authentic appearance | Looks legitimate | Check sender details carefully |
| Volume | Numbers game works | Train all employees consistently |
Strengthen Your Email Security
subrosa provides comprehensive phishing defense including technical controls, employee training, and simulated phishing campaigns to test readiness.
Enhance Email SecurityThe 15 Most Common Phishing Red Flags
Learn to recognize these universal phishing indicators:
1. Suspicious Sender Address
Red Flag: Email address doesn't match claimed sender
Examples:
- Misspellings: paypa1@paypal-security.com (1 instead of l)
- Wrong domains: admin@microsoft-support.net (not microsoft.com)
- Random strings: no-reply@ax7h2kj.com
- Free email services: ceo@gmail.com for corporate executive
Legitimate: support@paypal.com, security@microsoft.com
2. Generic Greetings
Red Flag: Impersonal salutations instead of your name
Examples:
- "Dear Customer"
- "Valued User"
- "Dear Sir/Madam"
- "Hello Account Holder"
Legitimate: Banks and services you use typically address you by name
3. Urgent or Threatening Language
Red Flag: Artificial time pressure or threats
Examples:
- "Your account will be closed in 24 hours"
- "Immediate action required"
- "Final notice before legal action"
- "Urgent security alert"
- "Respond within 2 hours or lose access"
Why it works: Urgency bypasses rational analysis
4. Requests for Sensitive Information
Red Flag: Asking for credentials, SSN, financial data via email
Examples:
- "Verify your password"
- "Confirm your SSN"
- "Update payment information"
- "Validate your credentials"
Reality: Legitimate organizations NEVER request sensitive information via email
5. Suspicious Links
Red Flag: URLs don't match displayed text or expected destination
Examples:
- Displayed: www.paypal.com | Actual: www.paypa1-security.com
- Displayed: Reset Password | Actual: http://ax7kd2.ru/login.php
- IP addresses instead of domain names: http://192.168.1.1/login
- URL shorteners hiding destination: bit.ly/abc123
Check: Hover over links (don't click) to see actual destination
6. Unexpected Attachments
Red Flag: Unsolicited attachments, especially with suspicious extensions
Dangerous extensions:
- .exe, .scr, .bat, .cmd (executable programs)
- .js, .vbs, .wsf (scripts)
- .zip, .rar containing executables
- .doc, .xls with macros enabled
- Double extensions: invoice.pdf.exe
Safer: .pdf, .jpg, .png (but still verify sender first)
7. Poor Grammar and Spelling
Red Flag: Typos, grammatical errors, awkward phrasing
Examples:
- "Your account is compromised please to verify"
- "Dear esteemed customer we are inform you"
- Random capitalization or punctuation
- Obvious machine translation artifacts
Note: Sophisticated attacks may have perfect grammar, don't rely on this alone
8. Too Good to Be True
Red Flag: Unrealistic offers or unexpected benefits
Examples:
- "You've won $10,000! Click to claim"
- "Free iPhone for taking 2-minute survey"
- "Inheritance from distant relative"
- "Guaranteed investment returns of 50%"
Reality: If it seems too good to be true, it definitely is
9. Mismatched Branding
Red Flag: Logo quality, colors, or formatting inconsistent with legitimate communications
Examples:
- Low-resolution or distorted logos
- Wrong corporate colors or fonts
- Inconsistent formatting
- Generic templates pretending to be official
10. Requests to Bypass Security
Red Flag: Asking you to circumvent normal security procedures
Examples:
- "Click here to avoid MFA this time"
- "Use this temporary password"
- "Disable your antivirus to open this file"
- "Install this software to fix security issue"
Reality: Legitimate IT never asks you to weaken security
11. Unusual Requests from Known Contacts
Red Flag: Email from colleague/boss with atypical request
Examples:
- Executive requesting urgent wire transfer via email
- IT department asking for your password
- HR requesting SSN "to update records"
- Different communication style than usual
Action: Verify through separate channel (phone call, in person)
12. Spoofed Internal Emails
Red Flag: Email appears internal but has subtle inconsistencies
Examples:
- john.smith@yourcompany.com vs john.smith@yourcompany.co
- Display name matches but actual address doesn't
- Reply-to address differs from sender
13. Unusual Payment Requests
Red Flag: Changes to payment instructions or methods
Examples:
- "Vendor changed bank account, update for payment"
- Request to purchase gift cards
- "Pay via wire transfer instead of normal invoice"
- Pressure to process payment before verification
Always: Verify payment changes through established contacts
14. No Contact Information
Red Flag: Legitimate contact details missing
Examples:
- No physical address
- No legitimate phone number
- Only provides email or web form contact
- Contact information doesn't match official sources
15. Inconsistent Details
Red Flag: Information in email contradicts itself or known facts
Examples:
- References services/accounts you don't have
- Mentions recent activity that didn't occur
- Contains wrong company name or details
- Dates or reference numbers don't make sense
How to Verify Email Senders
Proper sender verification is critical for phishing defense:
Checking the "From" Address
Step 1: View Complete Header
- In most email clients: Three dots menu → "Show original" or "View headers"
- Look for "From:" and "Return-Path:" fields
- Verify domain matches expected sender
Step 2: Examine Domain Carefully
- Check for subtle misspellings: micros0ft.com, paypa1.com
- Verify top-level domain: .com vs .co vs .net
- Look for hyphenated additions: amazon-security.com
- Confirm domain ownership if uncertain (WHOIS lookup)
Step 3: Check Reply-To Address
- Reply-to should match sender address
- Different reply-to address is major red flag
- Attackers use legitimate-looking sender with malicious reply-to
Common Spoofing Techniques
| Spoofing Method | How It Works | How to Detect |
|---|---|---|
| Display Name Spoofing | Sets display name to look legitimate while actual address differs | Always check actual email address, not just display name |
| Lookalike Domains | Registers similar domains with subtle changes | Carefully inspect every character in domain |
| Compromised Accounts | Uses legitimately hacked accounts to send phishing | Verify unusual requests through separate channel |
| Homograph Attacks | Uses Unicode characters that look like Latin letters | Copy/paste address to text editor to see actual characters |
Verification Through Known Channels
Never use contact information from suspicious email:
- Look up official contact independently: Use search engine or official website
- Call known phone numbers: Use numbers from previous legitimate communications
- Contact through separate channel: Call, text, or visit in person
- Log in directly: Type URL yourself instead of clicking email links
- Ask sender to verify: Request confirmation through established secure channel
Step-by-Step Email Verification Process
Follow this systematic approach to verify suspicious emails:
The STOP Method
S - Scrutinize the Sender
- ☐ Check complete email address, not just display name
- ☐ Verify domain matches expected organization
- ☐ Look for subtle misspellings or character substitutions
- ☐ Confirm sender is someone you know/expect to hear from
T - Think Before Acting
- ☐ Is this request unusual or unexpected?
- ☐ Does the email create artificial urgency?
- ☐ Am I being asked to bypass normal procedures?
- ☐ Does something feel "off" about this message?
O - Observe the Content
- ☐ Hover over links without clicking to see destination
- ☐ Check for grammar/spelling errors
- ☐ Verify logo and branding quality
- ☐ Look for generic greetings instead of personalization
P - Pause and Verify
- ☐ Contact sender through known channels to verify
- ☐ Navigate to websites directly instead of clicking links
- ☐ When in doubt, report to IT security
- ☐ Never provide sensitive information via email
Detailed Verification Steps
Step 1: Preliminary Assessment (30 seconds)
- Read subject line, does it create urgency or fear?
- Check sender address for legitimacy
- Scan for obvious red flags (poor grammar, suspicious links)
- Ask: Was I expecting this email?
Step 2: Content Analysis (1-2 minutes)
- Hover over all links to check destinations
- Examine any attachments (name and extension)
- Assess tone and language for manipulation tactics
- Check for personalization vs. generic content
- Verify logos and branding against known legitimate versions
Step 3: Technical Verification (2-5 minutes)
- View full email headers
- Check SPF, DKIM, DMARC authentication (if available)
- Compare sender domain to official domain
- Search for known phishing campaigns matching this email
Step 4: Independent Confirmation (varies)
- Look up official contact information independently
- Call or contact sender through known channel
- Navigate to website directly to check claims
- Consult IT security if uncertain
I Clicked a Phishing Link, Now What?
If you've clicked a phishing link or opened a suspicious attachment, take immediate action:
Immediate Actions (First 5 Minutes)
1. Disconnect from Network
- Disable Wi-Fi or unplug ethernet cable immediately
- Prevents malware from spreading or data exfiltration
- Stop communication with attacker's command-and-control
2. DO NOT Enter Credentials
- If you reached a login page, close it immediately
- Do NOT enter username/password even to "check if it's fake"
- Every keystroke may be captured
3. Document What Happened
- Take screenshot of email and any pages visited
- Note time of click and actions taken
- Preserve email (don't delete)
4. Report to IT Security Immediately
- Contact IT/security team using phone or separate device
- Don't delay, minutes matter in limiting damage
- Provide all details about incident
Follow-Up Actions (First Hour)
Working with IT Security:
- Malware scan: Run full antivirus/antimalware scan
- Account review: Check for unauthorized access or changes
- Network monitoring: Watch for unusual traffic patterns
- Password changes: Change passwords for potentially affected accounts
- MFA activation: Enable multi-factor authentication if not already active
If You Entered Credentials
Critical steps when credentials are compromised:
- Change passwords immediately: Use different device if possible
- Reset security questions: Attacker may have captured these too
- Enable MFA everywhere: Particularly on critical accounts
- Check account activity: Review recent logins and actions
- Monitor accounts: Watch for suspicious activity for weeks
- Alert related accounts: Notify any services using same credentials
If You Sent Money or Provided Financial Information
Financial fraud response:
- Contact bank immediately: Report fraud and attempt to stop transfer
- Place fraud alerts: Contact credit bureaus
- Monitor accounts: Check for unauthorized transactions
- File police report: Creates official record
- Report to FBI IC3: Internet Crime Complaint Center
Conclusion: Building Human Firewalls Against Phishing
Phishing attacks will continue evolving in sophistication and volume, but humans equipped with knowledge and vigilance remain the most effective defense. While technical controls provide essential baseline protection, educated employees who can recognize, verify, and report suspicious emails create organizational resilience that technology alone cannot achieve.
The 15 red flags covered in this guide provide a framework for phishing detection, but remember that sophisticated attacks may exhibit few obvious signs. The key is cultivating security skepticism: questioning unexpected requests, verifying through independent channels, slowing down despite artificial urgency, and reporting suspicious emails without hesitation or embarrassment.
Effective phishing defense requires sustained commitment across the organization. Regular training keeps awareness fresh. Simulated phishing campaigns test and reinforce skills. Easy reporting mechanisms encourage early alerts. Blameless culture ensures people report mistakes immediately rather than hiding them. Leadership modeling secure behavior sets organizational tone.
Organizations with comprehensive phishing defense programs, combining technical controls, security awareness training, simulated phishing testing, and strong reporting culture, reduce successful phishing attacks by 70-90% and minimize damage when attacks succeed. The investment in employee education yields returns that dwarf the cost: $50-100 per employee annually for training versus $4.91 million average breach cost from successful phishing.
Start today by implementing the verification steps in this guide. Slow down when faced with urgent requests. Verify senders through known channels. Hover before clicking. Question the unexpected. Report the suspicious. These simple practices, consistently applied, transform your workforce from potential vulnerability into powerful defense.
Remember: attackers only need to succeed once, while defenders must succeed every time. But with proper training, awareness, and verification procedures, you shift the odds dramatically in your favor. Every phishing email caught is a potential breach prevented, a ransomware attack avoided, or a fraudulent transfer stopped.
subrosa helps organizations build comprehensive phishing defense through technical email security controls, realistic phishing simulation campaigns, security awareness training, and incident response support. Our programs are tailored to your industry threats, organizational culture, and workforce demographics, ensuring maximum engagement and retention. Don't let phishing be your organization's weakest link.
Build Your Phishing Defense with subrosa
Protect your organization with comprehensive anti-phishing solutions including training, testing, and technical controls.
Strengthen Email Security