7 Phishing Email Examples From Our Own Inbox

PhisingEmailExamples_102019.jpg

Phishing is an attempt to access sensitive information by using fraudulent emails. Hackers use different social engineering tactics to get a receiver to reply or click a link so that they can gain access to computer systems.

Many of these emails will end up in your spam folder because the sender is outside of your domain, there’s a misleading subject line, or it’s from a sender who you don’t already engage with. 

But sometimes these emails don’t filter into spam folders. If your employees engage with these attackers, a few things could happen…

  • They’ll get scammed out of a couple of dollars

  • They’ll willingly give up their personal information

  • The attacker will gain access to their system and inject a ransomware attack

Here are a few phishing email examples and tactics that came straight from our inboxes. Luckily, none of these examples led to a breach or malicious attack.

  1. Simple Requests to Build Trust

  2. Email Provider Warning

  3. Malicious Links

  4. Shock Value and Scare Tactics

  5. Conclusion

Simple Requests to Build Trust

Some hackers attempt to build trust by using the names of your company’s trusted employers. But the email address is different than your employer’s work email address.

This email appeared to be from our CEO when it reached our inbox. It also contained a very generic subject line. Once opened, our users had to look closer to realize that the name didn’t match with the email address.

This was the trickiest phishing attempt we received this year. In some cases, malicious emails contain a lot of typos and grammatical errors. In this example, the email didn’t contain any grammar errors but rather one formatting issue; no space between the comma.

Even with that error, the attacker included the ever-popular “Sent from my iPhone” phrase at the end of the email. They added that phrase to the email so that the recipient was more likely to excuse any formatting problems.

Another interesting takeaway from this example is their initial request. The attacker’s asking for the victim’s personal cell phone number. They’re asking for this to make the attempt more elaborate. Their hope is that the victim doesn’t have their boss’s phone number. Moving the initial conversation away from email makes it harder for the victim to realize it's malicious.

Even if you recognize the sender’s name, always check that the email address is the one you trust, especially if the email is out of the ordinary.

Phishing emails don’t always include malicious links. Oftentimes they’re trying to get potential victims to engage. Both this attempt and the one before it used this social engineering approach.

If the recipients in these examples responded, there wouldn’t be any immediate effect. The attacker would respond impersonating one of our senior managers.

In most cases, these attackers ask for the “favor” of purchasing gift cards and send them the codes. They’ll usually state that they need it to finish a big project to make it seem like you’re contributing to the team.

Email Provider Warning

Sometimes your email service will tip you off that an email might be malicious. They do this by displaying a banner a bright-colored banner before the body. This warning banner told our employees to proceed with caution.

Hackers sometimes pretend that they’ve already communicated with you in the past to generate engagement. It’s hard to remember all the hundreds of emails we receive every day. If they take this approach, they’ll act as if they’re following up from a previous conversation.

Maybe they’ll say that you’re eligible for a deal they’re offering and that you need to contact them for more information. This is one of the most classic plays by attackers.

The example above was from a legitimate company. For their sake, we blurred out their contact information.

One of their employee’s email addresses fell victim to a hack. This hack took over their email and sent out more malicious content to their entire list of contacts. The attacker disguised the link as much as possible to make it seem legit.

Clicking on the link led to a fake login form that asked users for their passwords.

A few minutes later, this company’s IT department responded to all recipients.

In this instance, the company’s IT department acted fast. Only 51 minutes passed before they realized the attack and responded.

Sometimes, employees mindlessly click on the links within malicious emails without even realizing it. Clicking on the link within a phishing email is a worst-case scenario.

Who knows what’s behind that linked text. It could be…

  • A malicious executable file that will lock your system and devices

  • A fake survey form that asks you to enter personal information

  • A form of spyware that lays dormant and tracks everything you do on your device

Shock Value and Scare Tactics

Sometimes attackers use shock value to try to reach engagement. One popular strategy that they’ll use in this scenario is blackmail.

The example above is terribly formatted and threatening. They also tried to make our users feel useless by saying their only option was to pay them. This attempt was sent to one of our general email addresses used by multiple people. It was also highly inappropriate.

Even worse, attackers will use scare tactics that falsely threaten lives. If you believe there’s a real danger, you may act out of fear without first determining if the email is legitimate.

Most often, threatening phishing emails will request some form of payment through blockchain. They do this because it’s untraceable. Threatening anyone in this way is harassment and illegal so they request blockchain as a way to make their crime untraceable.

PhishingEmailExample7_102019

Outside of their threatening nature, both of these attempts use a similar format…

  1. Threat

  2. If you try anything other than paying, you’ll lose

  3. Pay using this link

  4. Specified timelimit to induce panic

  5. Odd disclaimer

If you’re ever faced with a threatening email and believe that it might be real, reach out to your local law enforcement.

Conclusion

Email services will typically filter dangerous emails into spam folders, but that isn’t always the case. Always check that the email address is one that you trust before replying or clicking any links.

If the email is suspicious, contact your compliance officer. Flag these emails as spam, too, so that in the future they get sorted into your spam.

Not all emails that go to your spam folder are phishing attempts, but be cautious when clearing it out. Don’t reply and don’t click their links.

Poor judgment with skeptical emails could hurt your company if attackers gain access to computer systems.