The Anatomy of a Phishing Email

by | Mar 16, 2018

Phishing is a hackers’s favourite way to (literally) bait you, a typical PC user, into allowing them access to your PC or network, by tricking you into clicking a link which surprises you with a bouquet …. of malware!

Below is a sample of a real phishing email that we received here at ActiveCo. In this case, it appears to be from GoDaddy, which is a website hosting service that many individuals and businesses use. For anyone who does use GoDaddy for hosting services, an email from them wouldn’t seem out of the ordinary.

But it should…..if it looks like this….

How could you stop yourself from clicking on that link to verify your account before it’s too late?

If you said, “By being more aware!”, then great job!

Let’s break this email down, shall we?

Phishing emails don’t have to be sophisticated (and usually aren’t), they just need to be good enough to get you to react, without thinking, and click on that link.

Also, earlier in that email, they said to click on the button below … there is no button below! Some obvious grammatical errors are key things to watch for, including:

  • Who sent the email, check the actual address, not just the name
  • Did you request this email?
  • Are there spelling errors?
  • Are there grammatical errors?
  • Is it constantly pointing out how “okay” it is for you to click on something?
  • Is there a link or attachment that has nothing to do with the contact or business that sent it?

We are fortunate to pass along helpful tips to our users and encourage them to spread the good word. Awareness and diligence is all we have left when it comes to cybersecurity, meaning no matter how flashy or expensive your anti-malware or anti-virus may be, there’s someone working hard right now to get around it.

Related Article:

10 Tips for Business Security Awareness Training

 

About the Author

Mina Moghadas

Learn more on this topic

Related Blog Posts

Keep Your Technology Up to Date to Retain Employees

Keep Your Technology Up to Date to Retain Employees

Whether you like it or not, millennials (those reaching young adulthood around the year 2000) make up a significant portion of the workforce and will continue to penetrate your industry as more and more staff "age out" of their current roles. Appropriately leveraging...

3 Strong Incentives to Get Your Hardware Organized

Your business relies heavily on hardware; workstations, servers, mobile devices, and more, to keep operations moving forward. However, managing these knowledge-intensive machines can demand your time and resources and often falls in the lap of the business owner. If...

Sextortion 2.0 is the Same Empty Threat with a Twist

Sextortion 2.0 is the Same Empty Threat with a Twist

Sextortion is a form of blackmail where the extortionist claims to have photos or video of the victim watching adult entertainment on their computer. The criminal threatens to send the compromising images out to the victim's email address book. We've described this...