Dangerous Email - Identifying a Phishing Attack

Summary

Some tips and techniques to identify a phishing attack.

Body

Summary

 

This article provides some tips, and examples, on how to identify a phishing attach.

 

 

What is Phishing?

Phishing is the attempt to get sensitive information (like user names, passwords, and financial information) by masquerading as a trustworthy source in an email.

  • They can range from crude basic attempts to get money directly, to more sophisticated attacks that include data about an organization you belong to.

 

 

How to Recognize Phishing

Note: The first thing to remember is that CWU will NOT ask you for confidential information in a ”BCC” email, and will not direct you to a link off our secure network.

 

The “To:” field

  • The “To:” field in many phishing emails is left blank.
  • This is because a phisher uses a compromised account to send an email, and instead of sending an email to 50 users from different organizations, they use the BCC to prevent you from notifying all the other potential victims, and tipping their hand that this is not to a homogenous group of recipients.

 

The “From:” field

  • In an IT Scam, it will come from someone NOT in your IT org, and likely not at the university at all.
  • In a money Phishing scheme, these will often not match at all
  • Example: FBI (Director) James Comey Jr. <simonlin@chinaconstruction.com.sg>

 

The Warning Banner

  • The warning banner is present and indicates that the email originated from outside the university

 

Links

  • Look for links that use “Click Here” or other generic terms to hide the link path.
  • Links that lead to a site other than the organization they are pretending to be. 
  • Often generic sub-sites, or foreign sites ending in a 2 letter country suffix like “.ru”, “.hu”, or “.ch”

 

Spelling and Grammar

  • Most Phishing attempts are initiated in countries where English is not a primary language.  As such, emails are fraught with grammatical and spelling errors.  See the examples below.

 

Generic IT terms

  • Phishing attempts use terms like “Web-Mail” or “Help Desk” so they don’t need to specialize to individual organizations. 
  • While some more sophisticated attacks will include certain levels of detail, they are always clear upon scrutiny.

 

 

Examples

All of these examples show the indicators of phishing as described above.

 

Example One

 

Example Two:

 

Example Three

 

 

What To Do If You Identify an Email as Phishing

Report an email as suspicious in your Outlook client by following the instructions in this article: 

 

More information on phishing and malicious emails can be found in this article:

 

If you've clicked on a link or interacted in any way with the email, follow these steps:

  •  Change your password immediately
  • Contact the Service Desk at (509) 963-2001 for assistance in securing your account.

 

 

Additional Resources

Here are related articles on:

 

Submit a Service Request

  • Submit a service request

  • If you need assistance with the above process, you can submit an online request and our Information Services staff will reach out to you.

Details

Details

Article ID: 2749
Created
Tue 11/18/14 2:21 PM
Modified
Mon 3/2/26 4:42 PM

Attachments

pptx

Phishing.pptx Computer

Wed 1/7/15 3:11 PM
;