Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Fortinet 970x120px
What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

Redazione RHC : 14 July 2025 07:29

With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organization you work for.

Certainly, having computers and servers that are up-to-date with system and security patches, antivirus software, and other endpoint tools helps greatly in reducing the risk of infection, but being prepared to recognize phishing emails and educating your organization’s employees to be proactive is crucial.

What is Phishing?

To understand how a malicious actor who threatens us with phishing emails thinks, you can watch Veronica Patron’s interesting video for Red Hot Cyber on Psychology and Social Engineering:

For a general introduction to what phishing is and the types of this attack vector, I refer you to Massimiliano Brolli’s article: https://www.redhotcyber.com/post/il-phishing-cosa-%C3%A8

To keep things simple, I’ll list twelve non-too-technical golden rules:

Never trust the email sender.

Many modern email clients or web email providers (like GMail, Microsoft, and many others) MAY NOT SHOW/INDICATE the actual email sender address, but rather an alternate name. For this reason, you may see a name or text that reminds you of a known/trusted address, but the underlying/hidden address is different.

B939cf C6ff6d9713c343538711f411f9f4aba5 Mv2
Figure 1

In Figure 1, you can see a fake email sent by ros…..…@libero.it, but actually sent from a real “hidden” email address horten……[email protected] (the figure shows how it looks today). The web mail client of the site www.libero.it and how the information is displayed to the end user.

Unfortunately, the protocols used for email are old (standard email, SMTP protocol) and based on standards that do not guarantee the reliability/trustability of the sender. Readers interested in the details can read RFC 5321 https://datatracker.ietf.org/doc/html/rfc5321 paragraph 7.1 Mail Security and Spoofing

SMTP mail is inherently insecure in that it is feasible for even

fairly casual users to negotiate directly with receiving and relaying

SMTP servers and create messages that will trick a naive recipient

into believing that they came from somewhere else.

So the underlying address could be a known/valid address, but used by malicious third parties, since as indicated in RFC 5231 p. 7.1 The protocol does not verify that a “sender” is actually “who they say they are.”

Look but don’t click

Hover over all parts of the email without clicking: if the text above clickable elements/links looks strange or doesn’t match the link text, DO NOT click and report the incident to your IT/Security department. See Figure 2.

B939cf 0dd43cc0fc3c44f3a3a3e5c600c7bd95 Mv2
Figure 2

Check for grammatical errors

Attackers often care little about misspellings and grammatical errors. This can distinguish a malicious actor from a legitimate sender. See Figure 3.

B939cf 368e5f2dd00149b28810a184050fb3d4 Mv2
Figure 3

“We’ve been hold your account…”: This sentence is incorrect in English. As in Figure 2, the link associated with the red text at the bottom of Figure 3 is also a sign of a malicious email.

Unprofessional graphics/slightly different logos

Malicious hackers often rush to create phishing sites and prepare scam emails, so some of these sites/emails may look significantly (but unfortunately, sometimes slightly) different from the ones used by the genuine “simulated” companies. These elements, as well as slight differences in logos/branding/icons, can be used to distinguish a malicious email from a legitimate one in your inbox.

Consider the words at the beginning of the email

Have you received an email with a vague/general opening, such as “Dear Customer” or “Respected Customer”?

Usually, companies that know you, with whom you have relationships, will call you by your name.

See Figure 3a. As in Figures 2 and 3, the link that appears when you hover your mouse over Figure 3a is a clear sign of a scam email.

B939cf 6b1524e6f7fc4b36a4f3ea5633812adc Mv2
Figure 3a

The email requests personal or health information, or bank account, credit card, or other account details

The legitimate companies you are connected to NEVER ask you for personal information, or are unlikely to ask you for it via email or phone call (remember Vishing and Kevin’s books). Mitnick on social engineering). See Figure 4.

B939cf 306b97f8d479488192c69984b5886827 Mv2
Figure 4

Beware of emergencies

These malicious emails might try to get you to think you need to do something truly urgent: send money (even just a little) to Claim a large reward or winnings, or, as in BEC/whaling/CEO fraud attacks, pretend to be a manager in your organization, claiming that your Chief Financial Officer needs an urgent wire transfer of a large amount of money.


B939cf 2188402b548e4f8482cb63e8de248b8e Mv2
Figure 5
B939cf 0d77a951c4c645428a7b1b780f27ab9c Mv2
Figure 6

Check the email signature

Most legitimate senders will send an email with a full signature block at the bottom of the email. Additionally, the information in that block must match the text elsewhere in the email. See Figures 4 and 5. There is no block. signature.

In Figure 7, you can see a mismatch between the sender reference and the details on the signature block.

B939cf Cd2c299263ce4012a63d57a9b6c0e9e5 Mv2
Figure 7

Beware of Attachments

An F-Secure report on the most dangerous types of email attachments states that there is an 85% chance that malicious emails contain .DOC, .XLS, .PDF, .ZIP, or .7Z attachments. These are the files that users often open without hesitation because they are so commonly used in businesses: hackers know this and use it to their advantage. This could be the entry point for software/dropper to launch a ransomware and/or APT attack.

Don’t believe everything you read

If something doesn’t add up, or seems even slightly out of the ordinary, call a colleague or someone at a third-party company who can confirm whether the email is legitimate or a scam. As a final check, always call and report the incident to your IT security experts.

Stay informed about attacks and techniques

New phishing scams are constantly being developed. Without keeping up with these new techniques, you could inadvertently fall for one. Keep your eyes peeled for new developments; by learning about them as soon as possible, you’ll be ahead of the curve. a much lower risk of being scammed and falling for it.

For IT administrators, it’s recommended to undergo ongoing security awareness training and simulate phishing attacks for all users in the organization to keep security top of mind.

When in doubt, contact the experts

When in doubt, always contact your organization’s cybersecurity experts.

Note to experts

Malicious attachments and URLs can be scanned using the VirusTotal site:

Extension points to avoid spoofing:

Conclusions

Although phishing can be a difficult topic to deal with at times, following the By following the simple tips and advice outlined in this article (and adopting appropriate phishing prevention software tools as mentioned in the introduction), you can significantly reduce your risk of falling victim to digital scammers.

Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli