{"id":14560,"date":"2021-11-17T09:00:00","date_gmt":"2021-11-17T09:00:00","guid":{"rendered":"https:\/\/www.mondoze.com\/blog\/?p=14560"},"modified":"2022-09-25T00:27:50","modified_gmt":"2022-09-24T16:27:50","slug":"how-to-identify-the-email-phishing-scam","status":"publish","type":"post","link":"https:\/\/www.mondoze.com\/blog\/tip-sharing\/how-to-identify-the-email-phishing-scam","title":{"rendered":"How to identify the Email Phishing Scam?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14560\" class=\"elementor elementor-14560\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5573510 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5573510\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2276a48\" data-id=\"2276a48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d64b0cb elementor-widget elementor-widget-heading\" data-id=\"d64b0cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anatomy of an Email Scam<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c34799a elementor-widget elementor-widget-text-editor\" data-id=\"c34799a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400;\">There is no doubt that email phishing&nbsp; scam can be very clever. After all, these types of phishing exist because they work. Let us take a closer look at the example below.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following image is a false Charles Schwab notice claiming the recipient has been locked out of his account and must update it to regain access. Here are some clues indicating this email is actually a scam:<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9fe487 elementor-widget elementor-widget-image\" data-id=\"b9fe487\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"450\" height=\"491\" src=\"https:\/\/www.mondoze.com\/blog\/wp-content\/uploads\/2021\/09\/schwab-email.png\" class=\"attachment-large size-large\" alt=\"schwab email scam\" srcset=\"https:\/\/www.mondoze.com\/blog\/wp-content\/uploads\/2021\/09\/schwab-email.png 450w, https:\/\/www.mondoze.com\/blog\/wp-content\/uploads\/2021\/09\/schwab-email-275x300.png 275w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fe0fb1 elementor-widget elementor-widget-text-editor\" data-id=\"5fe0fb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The email is not sent to the recipient. If the recipient were truly being notified by Charles Schwab whereby there was an issue with their account, they would know the recipient\u2019s name.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Similarly, they do not know the recipient\u2019s name. \u201cDear customer\u201d is not an identifier.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The recipient has not attempted to log in to a Schwab account, so the number of allowed attempts cannot be exceeded.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Grammatical errors: The words Online Banking are capitalized throughout the text. Also, if you read carefully, the text says <\/span><i><span style=\"font-weight: 400;\">&#8220;Please visit <\/span><\/i><i><span style=\"font-weight: 400;\">www.schwab.com\/activate<\/span><\/i> <b><i>Reset Account<\/i><\/b><i><span style=\"font-weight: 400;\"> your account&#8221;<\/span><\/i><span style=\"font-weight: 400;\"> which obviously does not make any sense, but since most people scan emails quickly, grammatical errors that are this small usually do not attract attention.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They encourage the recipient to confirm that the e-mail is sent from Schwab, so that the recipients can rest assured. Therefore, the recipients will use the provided link.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Let\u2019s look at number six which is marked in the image. When you hover your mouse over any link on this page, it shows the real email address. Based on the image, the email stated is actually <\/span><span style=\"font-weight: 400;\">http:\/\/almall.us<\/span><span style=\"font-weight: 400;\">. The scammer <\/span><span style=\"font-weight: 400;\">\/schwab.com\/<\/span><span style=\"font-weight: 400;\"> after the real name of his website to make it look legitimate.<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">If you notice any of these vulnerabilities in your email, it is enough to tell you that the email is a phishing attempt. But what if these errors do not exist?<\/span><\/p><p><span style=\"font-weight: 400;\">A smarter scammer can correct these errors, including knowing the recipient\u2019s name and email address, and masking their URL in a more convincing manner. If they had done a better job, there would have been nothing alarming in the message. But it would still be a fake.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-591768f elementor-widget elementor-widget-heading\" data-id=\"591768f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">In conclusion, there are 7 ways to recognize phishing email which is:<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8199614 elementor-widget elementor-widget-text-editor\" data-id=\"8199614\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li><b>Legit companies do not request your sensitive information via<\/b><span style=\"font-weight: 400;\"> email which as password, credit card information, credit scores, or tax numbers, nor send you a link which requires you to login.<\/span><\/li><li><b>Legit companies usually call you by your name<\/b><\/li><li><b>Legit companies have domain emails<\/b><\/li><li><b>Legit companies know how to spell<\/b><\/li><li><b>Legit companies do not force you to their website<\/b><span style=\"font-weight: 400;\">. Sometimes phishing emails are coded entirely as a hyperlink. Therefore, accidently clicking the link or deliberately anywhere in the email will open a counterfeit web page or download spam in your computer.<\/span><\/li><li><b>Legit companies do not send unsolicited attachments. <\/b><span style=\"font-weight: 400;\">Look out for high-risk attachment file types such as .exe, .scr, and .zip. When in doubt, contact the company directly using the contact which provided from their actual website.<\/span><\/li><li><b>Legit company links match legitimate URLs. <\/b><span style=\"font-weight: 400;\">Double check the URLs. If the link in the text is not identical to the URL displayed as the cursor hovers over the link, that is a sure sign you will be taken to a fault site. Ensure additional security by hovering your mouse over embedded links without <\/span><b>clicking it<\/b><span style=\"font-weight: 400;\"> and ensure the link begins with <\/span><b>https:\/\/<\/b><span style=\"font-weight: 400;\">.<\/span><\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Anatomy of an Email Scam There is no doubt that email phishing\u00a0 scam can be very clever. After all, these types of phishing exist because they work. Let us take a closer look at the example below. The following image is a false Charles Schwab notice claiming the recipient has been locked out of his &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mondoze.com\/blog\/tip-sharing\/how-to-identify-the-email-phishing-scam\"> <span class=\"screen-reader-text\">How to identify the Email Phishing Scam?<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":14842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":"","_wpscppro_custom_social_share_image":0},"categories":[30],"tags":[36],"_links":{"self":[{"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/posts\/14560"}],"collection":[{"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/comments?post=14560"}],"version-history":[{"count":13,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/posts\/14560\/revisions"}],"predecessor-version":[{"id":15134,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/posts\/14560\/revisions\/15134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/media\/14842"}],"wp:attachment":[{"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/media?parent=14560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/categories?post=14560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mondoze.com\/blog\/wp-json\/wp\/v2\/tags?post=14560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}