Tags: #cybersecurity #security #secops #email #phishing #scam
Last Reviewed: 26/08/2024
Verify the 'From' Domain:
Always check the email address of the sender to ensure it matches exactly with the official domain of the organization it claims to be from.
Look for common tricks such as similar-looking domains (e.g., “paypal-mail-server.com” instead of “paypal.com”).
Inspect the 'Reply-To' Field:
Check 'Mailed By' and 'Signed By':
In Gmail, examine the 'mailed by' and 'signed by' fields, which should match the claimed domain if the email is legitimate.
A mismatch can indicate a potential spoofing attempt.
Look for 'Via' in Gmail:
Use Email Authentication Records (SPF, DKIM, DMARC):
SPF (Sender Policy Framework): Verifies if the sending server is authorized to send emails for the domain. A pass indicates the email was sent from an approved server, but a fail suggests potential spoofing.
DKIM (DomainKeys Identified Mail): Ensures the email content has not been altered and confirms the sender’s identity via an encrypted signature.
DMARC (Domain-based Message Authentication, Reporting & Conformance): Confirms that the email aligns with SPF and DKIM checks and is a robust method for preventing spoofing.
Examine the Domain Closely:
Check for Unicode and ASCII Characters:
Use tools like a 'Unicode Inspector' or '
ASCII Validator' to detect non-standard characters that might be used to deceive the recipient by mimicking legitimate letters.
Inspect the Full Email Headers:
In Gmail or other email programs, you can view the full headers to see the path the email took and verify the SPF, DKIM, and DMARC results manually.
Be Wary of Unexpected Attachments or Links:
Critical Thinking and Awareness:
Use Spam Filters and Anti-Phishing Tools:
Check for Grammatical Errors and Unusual Language:
Many phishing emails contain poor grammar, unusual language, or awkward phrasing, which can be a red flag.
Hover Over Links to Verify URLs:
Before clicking any link, hover your mouse over it to see the actual
URL. Ensure it matches the legitimate site and doesn’t redirect to a suspicious domain.
Verify Requests Through Official Channels:
Monitor Financial Statements and Accounts:
Enable Two-Factor Authentication (2FA):
Update Software Regularly:
Educate Yourself and Others:
Report Phishing Attempts:
Use Email Sandboxing or Virtual Machines for Suspicious Attachments: