Skip to main content

Beware, trap! How to spot spam and phishing emails

Written by Barbara Aßmann

Today, email is an indispensable means of communication. Unfortunately, it is also a favourite target of scammers who try to trick us with spam and phishing emails. These unwanted messages can be not only annoying, but also dangerous if they succeed in stealing personal information or spreading malware.

Spam emails flood our inboxes with unsolicited advertisements and dubious offers, while phishing emails specifically target sensitive information such as passwords and credit card numbers by posing as trusted sources.

The good news is that there are usually clear indicators to help us spot these 'fake emails' and avoid falling for them.

In this article, you will learn what to look for to navigate the email world safely and protect yourself from these digital threats. Let's go through the most important characteristics so that you can recognise suspicious emails at a glance.

What exactly are spam and phishing emails?

As mentioned above, spam emails are annoying advertising messages that flood inboxes and are difficult to prevent. Email addresses that are publicly available in the imprint or on contact pages can easily be harvested and misused. Participating in competitions or providing data to dubious providers also often results in email addresses and telephone numbers being sold on. Although simple spam emails are usually harmless, they are still annoying and unnecessary.

Phishing emails are a different matter. Unfortunately, this type of spam is not harmless and can take down entire computers and empty bank accounts. Unfortunately, phishing emails are now so well-designed that they are difficult to distinguish from genuine emails or even harmless spam emails.

The term "phishing mails" is derived from the word "phishing," which itself is a play on the word "fishing." The concept of phishing involves tricking individuals into revealing sensitive information, such as passwords, credit card numbers, or personal identification, much like how a fisherman uses bait to catch fish.

Fun fact about the term ‘spam’:

The term "spam" originates from a Monty Python sketch titled "Spam", which aired in 1970. In the sketch, a group of diners in a café is overwhelmed by the repeated mention of "Spam," a canned meat product by Hormel Foods. The characters repeatedly insist on having Spam in their meals, making it increasingly absurd and annoying to those who dislike it. This constant repetition and overwhelming presence of Spam in the dialogue served as a comedic portrayal of unwanted and intrusive content.

In the early days of the internet, particularly in the 1990s, the term began to be used to describe unsolicited, irrelevant, or excessive messages sent via email, chat rooms, and other online platforms. Just like the overwhelming presence of Spam in the Monty Python sketch, these unwanted messages cluttered inboxes and were often annoying to users.

Let's first take a look at the various techniques used in phishing emails:

Phishing email techniques

Phishing emails use a combination of social and technical tactics to deceive recipients and steal sensitive information. Here are the main approaches behind phishing emails:

Social Engineering

Appear trustworthy:
Phishing emails appear to come from trusted sources such as banks, online services or government agencies.

Create urgency:
By creating a sense of urgency (e.g. 'Your account has been frozen'), recipients are put under pressure to act immediately without thinking.

Exploiting emotions:
Fear, curiosity or urgency are exploited to get the recipient to respond to the email.

Spoofing

Email spoofing:
The sender address is spoofed to make the email appear to come from a trusted source. The 'From' field in the email can be easily manipulated to display a familiar address.

Website spoofing:
The links in the email lead to fake websites, which often look almost identical to the real websites. These sites collect information entered, such as usernames and passwords.

Technical manipulation

Homograph attacks:
Using similar-looking characters in URLs to mimic legitimate websites (e.g. 'paypa1.com' instead of 'paypal.com').

Embedded links:
Links included in the email may appear to be a legitimate URL, but redirect the user to a bogus website.

Malicious attachments:
Phishing emails may contain attachments that contain malware or viruses. Opening these attachments may install malicious software on the user's computer.

Keylogging and screen scraping

Keyloggers:
Malware that records keystrokes can be distributed through phishing emails. This software captures everything the user types, including passwords and credit card numbers.

Screen scraping:
Malware can take screenshots of the user's activity and capture sensitive information.

Man-in-the-Middle (MITM)

Intermediate attack:
In some cases, phishing attacks can be carried out as MITM attacks, where the attacker intercepts and manipulates the communication between the user and the legitimate website.

Phishing kits

Easy access:
Ready-made phishing kits are available for use by cybercriminals. These kits contain pre-made phishing pages and instructions to make them easier to access for less technically skilled attackers.

Specific examples of phishing emails

Meanwhile, phishing emails flood our inboxes every day. Sometimes they're easy to spot because you don't have an account with a particular bank or you haven't bought anything from the supposed web shop. But more often, they are deceptively genuine, preying on users' insecurities to obtain sensitive information.

A few examples of typical phishing emails:

Bank account frozen

  • Subject line: 'Important message: Your account has been temporarily suspended'.
  • Content: Request to click on a link to unfreeze the account
  • Characteristics: Link leads to a fake website that looks like the bank's real website

PayPal verification

  • Subject: 'Your PayPal account has been suspended
  • Content: Requesting confirmation of payment details to unblock the account
  • Characteristics: Sender address similar to, but not exactly '@paypal.com'.

Tax refund

  • Subject: 'Your tax refund is waiting'
  • Content: Request for personal details to receive a supposed refund
  • Characteristics: Professional looking but fake logos and links

Email storage space full

  • Subject line: 'Your mailbox is almost full!
  • Content: Invitation to click on a link to expand storage space
  • Characteristics: Link leads to a fake page that looks like the email provider

Apple ID security issue

  • Subject: 'Your Apple ID has been suspended
  • Content: Request to click on a link and confirm identity
  • Characteristics: False return address, link leads to phishing site

Parcel delivery

  • Subject line: 'Your shipment could not be delivered
  • Content: Request to confirm delivery address via link
  • Characteristics: Sender is a fake parcel delivery URL, often with misspellings

Suspicious activity on social media account

  • Subject: 'Unusual attempt to log in to your Facebook account
  • Content: Request to verify account via a provided link
  • Characteristics: Link leads to fake login page that intercepts data

Lottery notification

  • Subject: 'Congratulations! You've won!'
  • Content: Request for personal information for 'Prize Delivery'
  • Characteristics: Promise of prize without prior participation

The main characteristics of phishing emails are as follows:

Urgency

They often claim that urgent action is required, e.g. ‘Your account has been suspended’

Known senders faked:

They look like they come from well-known companies or people, but the email address is often not quite right.

Links to fake websites:

The email contains links to fake websites that look very similar to the real ones, but are designed to steal your login details.

Attachment with malware:

Some phishing emails contain attachments that can install malicious software when opened.

Grammar and spelling mistakes:

Many phishing emails contain obvious spelling mistakes.

Impersonal salutation

The salutation in phishing emails is often very impersonal and general, such as 'Dear Customer' or simply 'Hello'.

14 concrete measures against phishing emails

What can you do to spot phishing emails and avoid falling for these nasty tricks?

Here are 14 specific steps you can take to ensure that phishing emails don't do you any harm. Each of these steps will help you verify the authenticity of an email and avoid potential dangers.

Do not open any links directly from the email.

Example: If you receive an email from your bank asking you to change your password, do not click directly on the link in the email. Instead, visit your bank's official website by typing the URL into your browser manually.

Returning to sender

Example: If you receive a suspicious email from a colleague or known contact, call the person or send a new email to their official email address to verify the request.

Check the links using the check tools

Example: Use tools like VirusTotal or PhishTank to check suspicious links before you click on them. Copy and paste the link from the email into one of these tools to check its safety.

Check email header

Example: Look at the email header to see if the sender address is authentic and if the email servers used to send the email are suspicious. If you receive an email from ‘support@yourbank.com’ but the actual server is ‘spamserver.com’, it is likely to be spam.

You can read more about how this works here:

Check email header

Do not open attachments without thinking

Example: Do not open attachments from unknown senders or suspicious emails. Even if the sender is known, but the attachment seems unexpected or suspicious, ask the sender before opening the attachment.

Use anti-virus software.

Example: Keep your anti-virus and anti-malware software up to date so that it can automatically detect and block potential threats.

Enable two-factor authentication (2FA)

Example: Activate 2FA for all important accounts such as email, bank and social media. Even if an attacker knows your password, they won't be able to access your account without the second factor (e.g. an SMS code).

Use secure passwords and change them regularly

Example: Use strong and unique passwords for each of your accounts and change them regularly. A password manager can help you manage them.

Be suspicious of emails with spelling and grammar mistakes

Example: Look out for poor grammar or unusual wording in the email. Reputable companies take care to use correct language in their emails.

Report suspicious emails as spam

Example: If you receive a suspicious email, mark it as spam or junk. This helps your email provider to improve its filters and protect other users.

Do not disclose any personal information.

Example: Reputable companies will never ask for sensitive information such as passwords or credit card numbers by email. Never disclose such information by email.

Check the email sender address

Example: Note the exact spelling of the sender's address. Phishing emails often use slightly modified versions of real addresses (e.g. ‘info@paypa1.com’ instead of ‘info@paypal.com’).

Keep your browser and software up to date.

Example: Make sure that your web browser, operating system and all installed programs are always up to date to prevent security vulnerabilities that could be exploited by phishing attackers

It's definitely time we get together!