Is there any definitive way to tell if an email is a phishing attempt? What cues should the "average computer" user employ to detect a phishing email?
-
33In doubt ask the sender out of band. This is a definite solution but not very scalable. – eckes Sep 19 '17 at 20:30
-
13@eckes: I've rarely tried this, but having dealt with companies whose representatives frequently have no idea what's going on in another department, I'm far less optimistic about it being a definite solution. Actually, I just remembered a case where a very well-known bank couldn't verify a phone number on their letter, despite it turning out to be legitimate. Go figure. – user541686 Sep 19 '17 at 21:36
-
True, it won't work for high volume, low value free internet services. But then again they won't sent mails which require a click (hopefully). – eckes Sep 19 '17 at 21:37
-
1The checklist below looks quite good to me, there is no reliable way to detect all. Some companies explain you how they proof authencity (including your account number or title) but that is a weak mechanism. Number one protection, never enter the password on a page you have not opened yourself from bookmarks or local copy of the URL. Some password managers help with that as they do not paste to different domains. – eckes Sep 19 '17 at 21:44
-
16If there were "definitive way", Mail operators would incorporate it in their spam filters. – el.pescado - нет войне Sep 20 '17 at 06:59
-
41The definitive way? Click on the link, give your personal data and wait. If something strange happens (your bank account gets depleted, your personal data is used without your consent, you get arrested for sending messages you never sent, you suddendly realized you are now subscribed to a service you never requested) then yes, it was phishing – frarugi87 Sep 20 '17 at 08:53
-
1@eckes: but if it is a phishing attempt, won't the sender (who is a crook) just lie? ;-) – Steve Jessop Sep 20 '17 at 12:46
-
22FWIW, I think the "real" answer to the X-Y problem is: do not take any action that relies for its correctness on whether or not the email you just received is a phishing attempt. That way you don't need to be able to tell the difference. For example, even if the email you just received is really from your bank, *still* don't click on links in it and then type your login details. Instead go to your bank's site, log in, and then either find a way to navigate to where the email told you to go, or as a last resort use the link in the email but *do not* log in again at its destination. – Steve Jessop Sep 20 '17 at 12:48
-
3... unfortunately this is impractical for *all* email, although it covers the usual finance/shopping phishing. If you get an email from your boss, saying, "what is the final price we are going to quote in the Jenkins pitch?", it's not really practical to *never* reply to that email without checking that the email address you're sending your answer to really is that of your boss, and not your sneaky competitor who has (for example) typo-squatted near your company domain name to create an approximation of your boss's email address. So really good spear-phishing can get you. – Steve Jessop Sep 20 '17 at 13:11
-
@SteveJessop: That's basically what my answer says. :-) But your text in the comments is more detailed/nuanced and really should be an answer itself (a better form of mine), IMO. – R.. GitHub STOP HELPING ICE Sep 20 '17 at 16:55
-
@SteveJessop well must phishes don't answer, but that's no guarantee. however "out of band" means asking without using the reply function or dialing a stated phone number or clicking a contact form link in the suspected mail – eckes Sep 20 '17 at 21:26
-
1And just because it was not mentioned before, very little company communication uses PGP or S/Mime whIch is a shame. – eckes Sep 20 '17 at 21:28
-
1Are you looking for a system with no false positives or no false negatives? – Cort Ammon Sep 20 '17 at 22:34
-
1Use white-list principle: only trust senders you know to be true. When a new sender approaches you, verify them using other channels. Always be on guard when someone approaches you wanting your personal data, credit card numbers, account name and/or password. Nobody should ask for those in an email (although your relatives or such might still ask for your current phone number, for example). In fact, if I were to redesign the email system I'd probably add some acceptance phase before email can actually be sent to the recipient. – Sep 21 '17 at 09:44
-
1@eckes: I was just joking that although you said ask "the sender", the person to ask is the *purported* sender, not the actual sender. – Steve Jessop Sep 21 '17 at 11:45
-
@SteveJessop If that is your sneaky competitor, forward it to your boss. – wizzwizz4 Sep 22 '17 at 15:51
-
The problem with any definitive method of detecting phishing is that any email which is definitively identified as NOT being a phishing attempt can actually be a prelude to a phishing attempt. – barbecue Sep 24 '17 at 23:11
12 Answers
There are a number of both technical and non-technical ways that someone can identify a phishing attempt.
Communicate out of Band. The easiest reliable way is to communicate with the proposed sender out-of-band. Call them, send them a what's app if applicable, signal, whatever. If an organization or an individual didn't send you an email they can tell you over the phone. Just remember to use a phone number that is not included in the email.
Proofreading - Much of the spam, even a lot of spear phishing, is very poorly written. Poorly constructed sentences and spelling errors are pretty good indicators of Spam.
Hovering over links - Phishing links will typically be "obfuscated" to look like they link to a login page. For instance the text may be https://login.facebook.com however when you hover over the link you notice it's some long verbose domain name. Tell-tale phishing.
EDIT : As Mehrdad and Bacon Brad have pointed out this method may provide mixed results. Links can be used in a variety of attacks such as CSRF / XSS attacks, and the link provided may also lead to an authorized third party.
Email Headers - Perhaps one of the more tech-savvy way of telling whether or not an email is legitimate is by looking at the E-mail Headers. E-mails contain metadata that states where emails originated from. You can usually tell by looking at the email header if an email originated from an authenticated source with these headers. Note that this is not foolproof as many organizations may outsource mail campaigns, but email coming from a private IP address could indicate a phishing email.
Macros - Does the word doc you've just been sent state you need to enable macros in order to see the document? Don't you go doing that.
Social Engineering - Many phishing email tactics will play off human emotions and employ many well known Social Engineering techniques. Statements like "You must click on this link and re-activate your bank account within 24 hours or your account will be closed" are meant to make the receiver panic. When we panic we make illogical decisions. If you feel an email is playing off your emotions you might be getting phished.
Is this normal behaviour? - Institutions are well versed in the ways of phishing and as such they are not going to ask you to click on embedded links in an email to "reset your password" or "confirm your account". If your spidey sense is tingling, probably phishing.
In my experience there is no one silver bullet in dealing with phishing. During penetration tests spear phishing always works. The above information will help you spot attempts to phish you, but the easiest and most efficient way to confirm or deny a phishing attempt is to call the "sender" to confirm if it's legitimate.
-
thanks Dknuckles - that is a comprehensive checklist! Is there a third-party tool for checking email headers? – daikin Sep 19 '17 at 19:06
-
2@daikin You shouldn't need a third party program to look at the email headers. For example, in the version of MS Outlook that we use at my office, I can go to File > Properties for a given email (double-click the email to open it in its own window) and see the headers in the dialogue panel that opens. – Steve-O Sep 19 '17 at 20:26
-
11Hovering over links doesn't necessarily work. Often legit companies have click tracking, which would defeat this. – user541686 Sep 19 '17 at 21:38
-
6I don't recommend hovering links as advice to regular end users and office staff. Instead I want them to treat all links as potentially unsafe. This is because they can either fall for https://login.facebook.com.evilurl.com/ or a XSS vulnerability of a legitimate URL. – Bacon Brad Sep 19 '17 at 22:37
-
+1 Excellent answer. Please incorporate Mehrdad and Bacon Brad's information into your answer more completely. – Dennis Williamson Sep 19 '17 at 23:57
-
3Regarding your "is this normal" point - if you just asked to reset your password or you just created your account, and they told you you'll receive a confirmation email, you should expect to receive a legitimate email possibly containing a link which you need to click on to proceed. If you didn't, it's almost certainly a phishing attempt instead. Although I have seen some shady "normal behaviour" from a number of legitimate companies, including banks. – NotThatGuy Sep 20 '17 at 00:34
-
"_but email coming from a private IP address_" how would you recognize that? – curiousguy Sep 20 '17 at 05:49
-
Isn't it also possible in HTML to manipulate the hover-over link shown when hovering an url? – JAD Sep 20 '17 at 07:51
-
1@curiousguy I've used IP WHOIS services before. This method requires a bit of savvy but if the IP addresses resolves to a company in Russia from an email supposedly from the IRS you can be sure it's spam. – DKNUCKLES Sep 20 '17 at 11:40
-
3For users of other mail clients and services, here's a list of explanations on how to view an email header for [Outlook, Outlook.com, Apple Mail, Horde, Roundcube, Yahoo, Gmail/Google Apps](https://kb.layershift.com/view-email-headers) and here's an instruction for [Thunderbird](https://www.lifewire.com/view-full-message-headers-thunderbird-1173106). – Tom K. Sep 20 '17 at 12:21
-
4Adding to the first point, large businesses often have phising reporting email addresses (e.g. "abuse@bank.com") - you can forward the email there and ask them to verify it for you. Remember that you should find this address by going to the business' web site, NOT by checking the email you received! – IllusiveBrian Sep 20 '17 at 19:05
-
1I received a phishing text today, which was quite clever because the link (click here to confirm your password) appeared to be legit, but a lower-case `L` in the url had been replaced with an upper-case `i`, which are impossible to tell apart by eye in an iphone text message. – James Sep 20 '17 at 21:08
-
3Although detailed header analysis requires a certain amount of tech skill, most phishing attempts fail at the first hurdle. If the "From:" header contains something like "Microsoft customer service
", you can be pretty sure the email's not genuine. (Note that the converse does _not_ hold: it's trivial to put any address you want in that header, so an "@microsoft.com" email address doesn't guarantee the email came from there. But most phishers are too stupid to do even that.) – David Richerby Sep 21 '17 at 00:11 -
1Note that another example of out of band communication is through social media. Most companies and some government departments have a support or marketing page on Twitter or Facebook which sometimes can answer questions on the matter. Things to note: 1) find a verified account if at all possible; 2) check that the account actually replies to users and doesn't just automate press releases; 3) check if someone asked the same question recently. – Nzall Sep 21 '17 at 09:13
-
3"Institutions are well versed in the ways of phishing and as such they are not going to ask you to click on embedded links in an email" - sadly, this is not true of a depressing number of institutions; Paypal, for instance, are awful at this. – IMSoP Sep 21 '17 at 13:39
-
@IMSoP, Ebay's not much better. I got a "log in to keep your account from being disabled" message, complete with suspicious-looking link, that turned out to be real. And it's not phishing, but the email alerts from my big-name bank routinely get caught by my spam filter, because they *look* like financial spam, complete with misspelled words and sequential exclamation points. – Mark Sep 21 '17 at 23:57
-
-
1Might I recommend `www.example.com` before some malicious person grabs up `www.somelongverbosedomainname.com`? – jpmc26 Sep 25 '17 at 08:21
-
1Good answer! I'd just rephrase "Just remember to use a phone number that is not included in the email." into "Just remember to get the phone number from a reliable source and not from the email" ( it could be that the email states the right phone number, so people can't always use a number "not included in the email"! (and shouldn't)) – Olivier Dulac Sep 25 '17 at 10:37
Does it ask you to do something that you should not do without authenticating the identity of the party who is asking you to do it? (Note that "entering a password" is such an action!) If so, you can effectively treat it as phishing regardless of the sender's motives, since email is not authenticated and thus is not a suitable means of requesting a privileged action.
- 7,813
- 1
- 23
- 34
-
23"email is not authenticated" -- and my efforts to get my bank manager to mutually sign PGP keys have so far been fruitless. – Steve Jessop Sep 20 '17 at 12:54
-
1@SteveJessop - In fairness to your bank manager, PGP keys are mostly for advanced users and they are the least likely to be phished. – paj28 Sep 23 '17 at 15:06
There is no perfect way to identify phishing emails, in the sense of a procedure that always successfully tells you, for any email, who sent it and why. In practice, a very large majority of actual phishing emails are fairly easily identified as such, because they're mostly quite half-assed. Some of them don't even make it to your inbox, because they're so blatantly fake than even your email provider's filter has spotted them. But there's no "definitive" set of features of the email that are possible to check every time.
Instead of trying to determine whether or not emails are phishing attempts, you should avoid taking any action that relies for its correctness on whether or not the email you received is a phishing attempt. That way you don't need to be able to tell the difference.
For example, even if the email you just received is really from your bank, still don't click on links in it and then type your login details. Instead go to your bank's site by typing a URL you remember, or using a bookmark. Then log in, and then look for a way to navigate to where the email told you to go. As a last resort because your bank's site is awful, after logging in you could use the link in the email but do not log in again at its destination, or give up any other sensitive information. But do beware that there are attacks other than phishing, which you could expose yourself to merely by visiting a malicious page and without giving up any sensitive information.
This works for the usual finance/shopping phishing attempts. Unfortunately there are cases where it is impractical. Suppose a talented spear-phisher, perhaps working for your competitor, typo-squats on a domain similar to your employer's domain, and sends an email that appears to be from your boss, using their actual email footer, saying "what price are we going to quote in the Jenkins pitch?". It's not realistic that every time you reply to a company email (dozens of times a day), you will carefull squint at the address you're sending to, to make sure it's really youremployer.com and not youremp1oyer.com, or yourempIoyer.com or (heaven forfend) youremploуer.com[*]. Your email client may or may not help you, in terms of visually indicating whether or not an email address is already in your personal address book or company directory.
The difference is that your employer, for whatever reasons, has decided that they will use email as their medium for communicating confidential information. Your bank, on the other hand, has made a different decision. The proper channel for sensitive communication to and from your bank is their website, or a phone app, or perhaps by telephone (although do not trust calls purportedly from your bank), or by post for certain things, or in person. So do not trust email that is or appears to be from your bank. Don't even trust it to link to your bank's site. Instead, consider it a prompt to use a channel you can trust.
[*] The first one is easy: digit 1 for lowercase L. The second is a little harder in many fonts: uppercase I for lowercase L. The third substitutes a lowercase Cyrillic Y for the lowercase Roman Y. If your mail client renders it at all, likely you won't be able to tell the difference by appearance.
- 2,008
- 10
- 14
-
1This seems like the best policy to me. It solves the problem that Paypal, for instance, send legitimate e-mails that are indistinguishable from phishing attempts (links redirecting via a third-party domain that then prompt you to log in). Checking those is just a waste of time, so "never click links" is a safer policy. – IMSoP Sep 21 '17 at 13:37
-
2My short form for this is "always originate, never accept" for communications like this outside of work. I've caught one spear phishing attempt by this, where someone got hold of my tax accountant's mailing list. I include the phone as well as email - if you called me, I'll call you back via the main switchboard at the place in question. – Joe McMahon Sep 22 '17 at 21:02
-
2@Joe: yes, I've had varying experiences of this. A security call from my credit card, I asked them how they would verify their identity, then said "hang up and call us back on the number printed on the back of your card, the switchboard will route you back to us", which was very good. Calls from banks about random sales nonsense are sometimes quite perplexed as to why I refuse to answer their security questions, although here in the UK at least, the industry as a whole is gradually learning better standards. – Steve Jessop Sep 29 '17 at 11:11
While many phishing mails are obvious, there is no definite way to detect the more clever phishing. And it looks like the amount of clever phishing is increasing.
There are techniques which might help to find out if the sender is the one he is claiming, i.e. digital signatures, DMARC (which includes DKIM+SPF) etc. But these need to be employed on the sender site and verified on the recipient site - and both is either lacking in lots of cases or is made (unnecessarily) complex.
If the mail claims to be from a sender you already know you might compare the mails with the ones you've received earlier for a variety of features, like same email address of sender, same transport path (received header in mail), same mail client .... Many of these features are only visible in the source code of the mail and many of these require expertise to extract and compare so average users will not be able to do this (apart from lack of time and motivation in most cases).
I recommend to take a look at a recent talk about this topic at the latest Blackhat conference: Ichthyology: Phishing as a Science.
- 184,332
- 29
- 363
- 424
-
Steffen, Does DKIM always go hand-in-hand with SPF? Is DMARC perceived as effective (if implemented) among IT security people? – daikin Sep 19 '17 at 19:07
-
2@daikin: DKIM and SPF are separate things. DMARC unifies both and also binds these two to the domain given in the From header of the mail instead of only to the SMTP envelope. They are considered kind of effective although they can also break, like SPF when forwarding and DKIM if an MTA converts a 8bit mail to quoted-printable or similar. – Steffen Ullrich Sep 19 '17 at 19:35
-
Just to expand on Steffen's point here - while encryption (should) provide positive proof of identity, even where it is implemented, it only provides proof that the machine can recognise - not the user. Browser are better than mail user agents at conveying this to the user, but users are still taken in by URL cloaking and sites which don't even bother to conceal the true URL. While I've said that MUAs are worse than browsers, they should actually be easier targets on which to implement behaviour learning, integrity inference and informing users about the level of trust inferred. – symcbean Sep 21 '17 at 16:15
It's so difficult that it's not worth trying.
Yes, there are ways to greatly increase detection. But any of them are beatable by the phishers.
- Broken English - they simply need to obtain a genuine Wells Fargo email and alter the URLs/particulars.
Received:
headers - they simply need to crack any box anywhere within Wells Fargo which can access any official SMTP server.- Hover links (actual destinations) -- frankly, companies are making these worthless all by themselves, by grabbing random domain names for official content.
- Normalcy and social hacking doesn't come into play if the phishing email looks routine, i.e. "here is your monthly account statement".
I'm sorry. You can't tell them apart. Convincing yourself you can is the surest way to get blind-sided. Because to succeed, you must get it right every single time. They only need to be lucky once.
Getting it right every single time is just not worth the effort when there's an easy alternative.
Just treat them all as dubious and go out-of-band.
I never click links in email from banks. This is long habit.** I treat bank emails only as a tickle to maybe go check my account in a different app, or phone or just walk in.
Now, phone forces you into a reality check: is this message believable or important enough to bother another human with? Do I really need a CS agent to tell me "No, your account is not locked, why would we do that?"
** partly, that's because of my platforms. On mobile, I have a dedicated app for my bank, and have no reason to use their Web UI. On desktop, I do my webmail in FireFox, where I disabled Javascript, so I can't click a link as the bank site won't work -- this forces me to switch browsers and navigate. I could copy/paste the click link if I really want to - but I really don't. I mean, I will do that for password reset emails, but I'm expecting those.
- 3,101
- 10
- 17
There is one definitive way for me, and it didn't deceived me for more than 15 years of receiving a continuous flow of crapware. I am not sure if it will suit every user without a minimum training, but I will give it since it is simple, free and survived many baptism of fire with every new phishing technology.
I just read the full source of headers of any dubious E-mail. By dubious E-mail, I consider also any E-mail coming directly from a known colleague sent from its professionnal address as soon as I see a request I have to check his identity to comply to his request. See the short but striking answer from R..
For exemple, an E-mail from my sister Alice sent from her real professionnal address asking me to make her a Western Union transfer to her postal address in Nicaragua were she was stolen of everything. By looking at the full headers sources I discovered that the first IP address used was a private IP (192.168.1.217) and the first public IP one was in Nigeria. I even noticed that this E-mail was sent with her real account authenticated and I am able to warn her CISO that her password was stolen (through a phishing attack as usual).
With the training to read these awful headers I am able to recognize them within less than 15 seconds, without even to have to check their source IP location.
- 3,033
- 14
- 34
-
2I don't think I'd even need to look at the headers to be mightily suspicious of that email from Alice. – Simba Sep 22 '17 at 12:48
No, there is no fool-proof way to identify phishing e-mails.
If there were, we would have programmed this way into a piece of software and have it installed on all mail servers and the problem would go away.
There are long lists of clues - other answers do a good job listing them - but the field is always changing and the list is never perfect. Fortunately, most phishing mails are done by amateurs and are trivial to spot with some experience, because most users are easy to fool and thus the creators of phishing mails don't have to do much effort.
However, there are some extremely well done phishing mails, especially when spear-phishing (i.e. targetting individuals, often skilled and educated in IT). Some study ten years ago (sorry, don't remember the link) showed that even IT professionals got well-done phishing e-mails wrong about 30% of the time.
Also note that if you expand considerable efforts establishing what's going on, the scammer has already succeeded in wasting your time. Studying the headers or any other excercises mentioned are for people who don't get 200 mails every day.
- 10,124
- 18
- 51
On top of the great answers above, something else that gives you a good clue is to right click the links on the page (make sure you don't left click!) and choose 'Inspect Element'*.
If this is a fake email, you'll see some nonsense email address. Ones that I often see start with "adclick.g.doubleclick.net/". You may also get an irrelevant company addresses on what looks to be genuine links.**
Though I'm sure this website is legit, if I have an email telling me to use a link like this to cancel an order then this is clearly a scam.
* This may show up as another similar name like 'Inspect', depending on the browser
** A lack of a suspicious link does not make it a genuine email. See the other answers for more things to check
- 111
- 2
-
1This obviously only works if you are reading your e-mail in a web browser. – user Sep 21 '17 at 19:53
-
As a security rule of thumb I neither read my professional E-mail in a web browser, nor in a software able to automatically send any HTML code in a web browser. Before copying an URL I saw its source (in fact I don't see the displayed value like "Click here!") and decided it is really an important information. – dan Sep 23 '17 at 21:49
If the email includes a link, there are some basic checks you can do by opening it in a private browsing window.
Make sure your private browsing window is as secure as possible before starting. At a minimum, make sure your browser is fully updated. You may also wish to disable Javascript, run the browser in a sandbox such as Firejail, or even isolate it in a virtual machine (using VirtualBox or similar).
Now open the link in the private browsing window. Once the page loads, check the address bar. Make sure the hostname (in modern browsers this part of the address is usually darker than the rest) matches the site you expected to reach. The most important part of the hostname (and the hardest for an attacker to impersonate) is the part at the end, from the organisation name onwards. So if the link you've got in your bookmarks is www.facebook.com, then login.facebook.com is probably OK, but www.facebook.example.com or www.facebook.biz is not.
Check that the site has a valid certificate - on most modern browsers, there is a green padlock in or near the address bar. If it's missing, red, yellow, or grey, then you probably shouldn't log into this site, even if you are able to prove it is the correct address.
Next, if the page you reach has a login option, use it, but with non-working credentials. Phishing attacks will typically not make any attempt to validate the credentials you enter, whereas a real site would. If it doesn't alert you that the credentials were invalid, it's probably a phishing attack.
And finally, if you can avoid using the link in the email, then do. If you've got a link to the site in your bookmarks, or you can get hold of a trusted address in some other way, log in using that address instead.
- 2,520
- 2
- 17
- 22
-
1So your recommendation on receiving an email that you think might be malicious is to open the links in it? That seems like a terrible idea. Private browsing windows won't protect you against malware and your scheme of using non-working credentials will fail if the bogus website operates as a man in the middle between you and the real website. – David Richerby Sep 21 '17 at 00:20
-
Well, I suppose technically, the question was how to identify phishing, not how to avoid drive-by downloads. If you can improve your chances of doing the former by taking risks around the latter, then personally I'm not up for that, but the questioner might have a spare PC they don't mind burning afterwards ;-) – Steve Jessop Sep 21 '17 at 12:24
-
1If you're using an up-to-date browser, drive-by downloads are unlikely to be an issue, although of course some browsers do a better job at security and privacy than others. I'll flesh that out a bit. Man-in-the-middle is a concern, but in practice I've never known attackers to do this correctly. Given that the top-voted answer suggests checking for poor spelling, I think it's reasonable to check for technical points that attackers rarely get right. – James_pic Sep 21 '17 at 15:54
-
3By the time you have loaded the linked page, the sender may very well know that your e-mail address is both *valid* and *monitored*. That makes it much more valuable for putting on list of e-mail addresses for sale; anyone can come up with random e-mail addresses, but it takes more effort (and increases the rate of return for a spammer) to actually confirm that they are valid. – user Sep 21 '17 at 19:57
This may be mere pedantry, but no: there is no definitive way to tell whether an email is a phishing attempt.
Suppose that a Nigerian princess was indeed in need of assistance in transferring large sums of money out of the country; suppose further that she had no one else in the world to turn to, and was indeed reduced to sending out email messages to total strangers. In such a situation, a user could receive a legitimate request for assistance from a Nigerian princess, which would nevertheless be identical to a classic phishing message.
(A non-pedantic application of the above example would be to ask yourself whether you are more bothered by false positives or false negatives, which will inform how strict a filter you implement.)
- 657
- 6
- 9
-
5Again, this might be mere pedantry, but advance-fee fraud isn't technically phishing. So as long as the Nigerian princess restricts herself to asking you to send a $1000 processing fee to release her vast fortune into your custody, her email won't be confused with a phishing attempt ;-) – Steve Jessop Sep 21 '17 at 13:54
-
2If you want to be pedantic: There has never been a prince of Nigeria. Since it's founding in 1960, Nigeria was always either democratic or ruled by a military junta. There are various PARTS of Nigeria where local traditional rulers are called king or sultan etc. but I guess they'd be proud enough of their heritage to call themselves princes of that area, not of Nigeria. – Tom Sep 24 '17 at 05:01
Not in the generality like you're asking. And the problem are not alone the phishing mails. Have a look at mails from legitimate senders like twitter, amazon, paypal and others.
Many of them use bad practices. Linking https://mysite
to https://mysite-mailtracking.com/asdf
, using complicated HTML in the mail, using different domains as main service domain, mail sender domain and domains they mention in the mail and put a lot of information in images instead of text.
When you want to test it as an expert who wants to see how they are phishing, a method would be "click in a secured browser, watch to what domain you're redirected and if this matches the form you get when you manually login and open the form". But that's nothing to suggest to a user, who falls for much simpler stuff.
So the reasonable advice here: Ignore anything in the mail but that something happend and login with your browser like you do everyday. Most services will tell you what the mail wanted you to know, as users today often use the website/app more often than they read their mails.
- 3,173
- 11
- 24
A professional security firm can usually determine with near-certainty whether an email is phishing or not. This may not be useful to the average user, but here's how they would do it:
Email origin
Emails contain a series of headers that show the IP address of mail relays. These can be analysed to identify the IP address of the sender. This should be the legitimate organisation. If it's a ToR exit node, that's highly suspicious.
There are scenarios where the origin is inconclusive, such as a third-party mail provider. In that case, the company would speak to the mail provider and legitimate organisation, and could normally resolve this.
They would also look at the source email address, and maybe check the outgoing email logs of the legitimate company.
Email content
Typically a phishing email has a link to a website that is NOT owned by the legitimate organisation and asks for login details. The domain might be deceptive (e.g. mybank-secure.com is nothing to do with myback.com), be a lookalike (e.g. a capital I looks like a lower-case l) or might use an attack like cross-site scripting or session fixation to show the legitimate domain. To deal with all these, the email source would be manually analysed as plaintext, and the ownership of all domains investigated in detail. In some cases this could be a legitimate email using bad practice - but it's best not to enter your details anyway!
The mail may also contain malware. Running anti-virus software on any attachments is a start. But this could be polymorphic or zero-day malware that resists anti-virus. Instead, manual analysis will try to identify anything that looks suspicious. A Word document with an onload macro that creates an OLE object may not trigger anti-virus software - but it is certainly suspicious.
Again, this won't always be conclusive. For some kinds of spear phishing, it may be impossible to distinguish legitimate from fraudulent content. If someone is selling something, and just before payment receive an email saying "actually, send the money here..." - the content alone doesn't help you, you need to check the origin.
I've never been asked to do this, but I expect most forensics companies do from time-to-time. In large organisations, sometimes bulk emails are sent to customers without proper authorisation. Perhaps such an email was reported as phishing, then the original organisation needs to work out what happened. If this happens, it shows the organisation has poor controls around customer emails, but that won't come as a great surprise.
Anti-phishing advice
Bookmark the sites you care about - your bank, credit card, etc. If you receive an email from them, don't click that link; instead use your bookmark. This simple precaution defeats the vast majority of phishing attacks.
- 32,736
- 8
- 92
- 130