Phishing attacks: Watch out for these four red flags

Recently, we’ve been on the receiving end of several phishing attacks. Thanks to the vigilance of our Ducks, none have yet succeeded.

Danny Bluestone
3 min readFeb 11, 2021

But it’s been a welcome reminder of the danger of phishing, and a good test of the process and security we have in place to defend ourselves.The attempts have included:

  1. Emails that look like collaborative documents shared by colleagues.
  2. Emails apparently from me, asking team members to purchase gift vouchers on my behalf.
  3. Emails apparently from me, asking for people’s mobile numbers.

Some of them are pretty creative and they can also be quite convincing. Until you look more closely:

A spoof email from Danny

This email wasn’t from me and I don’t call him Rick🥲

Another fake email from Danny

This wasn’t from me and it doesn’t sound like me either.

With phishing attacks, the first line of defence for many businesses, including Cyber-Duck, is some form of email security software. In many cases, good software, properly configured, will block and trap phishing attacks before they get to your mailbox. That’s certainly the case here at Cyber-Duck. But the system is not infallible, and in many cases it may only give you an 80% success rate.

This inevitably means that some phishing attacks will still get through and will land in people’s mailboxes.

And… another fake email from Danny

We train our team to check the ‘From’ field and to be careful clicking on links.

This is why employee training is a vital component of any businesses defence. Ideally training is given through a layered approach:

  1. As part of our induction and the competency plan.
  2. Then reinforced via company-wide refreshers.
  3. And regular reminders in weekly meetings.

Phishing emails aren’t that hard to spot. Here are four red flags to look out for:

  1. Frequently the actual sender’s address will be inaccurate. An email purporting to be from me may well use my name, but the email address will usually be some random Gmail/Yahoo or other made-up address. This is a significant indicator that we’re encouraging people to check.
  2. The language used in phishing emails will be out of character too, for example calling a staff member by a different nickname or using a new tone of voice.
  3. The request may be unusual. Asking for money to be transferred to an account, or for you to hand over a personal mobile number or other information with no real explanation of why.
  4. Finally, it may request you to click a link or log in to a webpage — something you should never do as a result of an email.
This time its a spoofed phishing email from our HR team

Never log in to a webpage or service by clicking on an email — unless you’ve checked it’s legit.

One of the most important things we’re training our Ducks to do is ‘stop and check’. If they are at all unsure, get back in touch with the sender by starting a new email (don’t hit reply!), or phone them to ask. This check will quickly reveal if the email is a scam and could save the business from financial loss and embarrassment.

While security software offers some protection, there is no substitute for well-trained, vigilant staff — they’re a critical line of defence.

--

--

Danny Bluestone
Danny Bluestone

Written by Danny Bluestone

My first word was 'button' and I have been pressing them ever since! Founder of Cyber-Duck, a UK Digital Transformation Agency that loves Service Design and UX

No responses yet