Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

Redazione RHC : 14 July 2025 07:29

With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organization you work for.

Certainly, having computers and servers that are up-to-date with system and security patches, antivirus software, and other endpoint tools helps greatly in reducing the risk of infection, but being prepared to recognize phishing emails and educating your organization’s employees to be proactive is crucial.

What is Phishing?

To understand how a malicious actor who threatens us with phishing emails thinks, you can watch Veronica Patron’s interesting video for Red Hot Cyber on Psychology and Social Engineering:

For a general introduction to what phishing is and the types of this attack vector, I refer you to Massimiliano Brolli’s article: https://www.redhotcyber.com/post/il-phishing-cosa-%C3%A8

To keep things simple, I’ll list twelve non-too-technical golden rules:

Never trust the email sender.

Many modern email clients or web email providers (like GMail, Microsoft, and many others) MAY NOT SHOW/INDICATE the actual email sender address, but rather an alternate name. For this reason, you may see a name or text that reminds you of a known/trusted address, but the underlying/hidden address is different.


Figure 1

In Figure 1, you can see a fake email sent by ros…..…@libero.it, but actually sent from a real “hidden” email address horten……[email protected] (the figure shows how it looks today). The web mail client of the site www.libero.it and how the information is displayed to the end user.

Unfortunately, the protocols used for email are old (standard email, SMTP protocol) and based on standards that do not guarantee the reliability/trustability of the sender. Readers interested in the details can read RFC 5321 https://datatracker.ietf.org/doc/html/rfc5321 paragraph 7.1 Mail Security and Spoofing

SMTP mail is inherently insecure in that it is feasible for even

fairly casual users to negotiate directly with receiving and relaying

SMTP servers and create messages that will trick a naive recipient

into believing that they came from somewhere else.

So the underlying address could be a known/valid address, but used by malicious third parties, since as indicated in RFC 5231 p. 7.1 The protocol does not verify that a “sender” is actually “who they say they are.”

Look but don’t click

Hover over all parts of the email without clicking: if the text above clickable elements/links looks strange or doesn’t match the link text, DO NOT click and report the incident to your IT/Security department. See Figure 2.


Figure 2

Check for grammatical errors

Attackers often care little about misspellings and grammatical errors. This can distinguish a malicious actor from a legitimate sender. See Figure 3.


Figure 3

“We’ve been hold your account…”: This sentence is incorrect in English. As in Figure 2, the link associated with the red text at the bottom of Figure 3 is also a sign of a malicious email.

Unprofessional graphics/slightly different logos

Malicious hackers often rush to create phishing sites and prepare scam emails, so some of these sites/emails may look significantly (but unfortunately, sometimes slightly) different from the ones used by the genuine “simulated” companies. These elements, as well as slight differences in logos/branding/icons, can be used to distinguish a malicious email from a legitimate one in your inbox.

Consider the words at the beginning of the email

Have you received an email with a vague/general opening, such as “Dear Customer” or “Respected Customer”?

Usually, companies that know you, with whom you have relationships, will call you by your name.

See Figure 3a. As in Figures 2 and 3, the link that appears when you hover your mouse over Figure 3a is a clear sign of a scam email.


Figure 3a

The email requests personal or health information, or bank account, credit card, or other account details

The legitimate companies you are connected to NEVER ask you for personal information, or are unlikely to ask you for it via email or phone call (remember Vishing and Kevin’s books). Mitnick on social engineering). See Figure 4.


Figure 4

Beware of emergencies

These malicious emails might try to get you to think you need to do something truly urgent: send money (even just a little) to Claim a large reward or winnings, or, as in BEC/whaling/CEO fraud attacks, pretend to be a manager in your organization, claiming that your Chief Financial Officer needs an urgent wire transfer of a large amount of money.



Figure 5

Figure 6

Check the email signature

Most legitimate senders will send an email with a full signature block at the bottom of the email. Additionally, the information in that block must match the text elsewhere in the email. See Figures 4 and 5. There is no block. signature.

In Figure 7, you can see a mismatch between the sender reference and the details on the signature block.


Figure 7

Beware of Attachments

An F-Secure report on the most dangerous types of email attachments states that there is an 85% chance that malicious emails contain .DOC, .XLS, .PDF, .ZIP, or .7Z attachments. These are the files that users often open without hesitation because they are so commonly used in businesses: hackers know this and use it to their advantage. This could be the entry point for software/dropper to launch a ransomware and/or APT attack.

Don’t believe everything you read

If something doesn’t add up, or seems even slightly out of the ordinary, call a colleague or someone at a third-party company who can confirm whether the email is legitimate or a scam. As a final check, always call and report the incident to your IT security experts.

Stay informed about attacks and techniques

New phishing scams are constantly being developed. Without keeping up with these new techniques, you could inadvertently fall for one. Keep your eyes peeled for new developments; by learning about them as soon as possible, you’ll be ahead of the curve. a much lower risk of being scammed and falling for it.

For IT administrators, it’s recommended to undergo ongoing security awareness training and simulate phishing attacks for all users in the organization to keep security top of mind.

When in doubt, contact the experts

When in doubt, always contact your organization’s cybersecurity experts.

Note to experts

Malicious attachments and URLs can be scanned using the VirusTotal site:

Extension points to avoid spoofing:

Conclusions

Although phishing can be a difficult topic to deal with at times, following the By following the simple tips and advice outlined in this article (and adopting appropriate phishing prevention software tools as mentioned in the introduction), you can significantly reduce your risk of falling victim to digital scammers.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli