PhishWarn

How to recognize phishing?

Recognizing phishing can be quite difficult. Here are some indicators that may tell you a message is suspicious.

Non-professional address

Professional companies use their own domains for their e-mail addresses instead of using free mail services, e.g.: support@twitter.com instead of twitter@yahoo.com.
Read more...
Professional companies almost always have a website with a customized domain name, such as apple.com for the smartphone vendor Apple or nytimes.com for the New York Times. Whenever you receive an e-mail from a company you should search the internet for their website domain and check whether it corresponds with the e-mail domain.

Let’s say, you received an e-mail seemingly from Twitter. If you don’t know already, you quickly find out that their domain is called twitter.com . Now, what’s the sender’s e-mail address? Let’s say it’s support@twitter.com . The domain is the part behind the @ symbol, so in this case it’s twitter.com . That definitly seems legit.

But what if the sender is twitter@mail.com ? There’s the word “Twitter” in it too. The difference is: It’s just a random user name which is not unique. The domain is mail.com , a popular e-mail provider for private users. A company like Twitter would never use such an unprofessional mail service when they could use their shiny twitter.com domain.

Fake support of free e-mail service

Some scammers don’t try imitating a company by using a free service like with the twitter@yahoo.com example above. Instead, they try to imitate the free e-mail service itself , e.g.: friendly-user-support@yahoo.com . This seems to be Yahoo’s actual customer support but it’s actually just a random user account that happens to have a “weird” user name. That’s why you should always google whether the sender’s e-mail address actually belongs to your e-mail service’s support.

Wrong account address

A fraudster usually doesn’t know which e-mail address belongs to which online account (or vice versa) so you may receive a phishing e-mail seemingly from Amazon to an e-mail address of you which doesn’t belong to your actual Amazon account. And as Amazon would never ever send any e-mails to addresses that don’t belong to the respective user account you can be quite sure that e-mails to the wrong address are actually phishing attempts.

Messages from services you don’t use

Scammers just imitate any popular company/service out there because then the chances are quite high that the randomly chosen victim actually uses the respective service. But let’s say, you receive an e-mail from TikTok but you don’t even use TikTok – then it’s obviously a fake.

Sub-domain instead of domain

Some scammers buy own domains for their e-mail addresses and make them look like legit ones, e.g.: support@amazon.com.beispiel.de . It looks like the domain was amazon.com but it’s beispiel.de instead.
Read more...
Many scammers don’t do something as simple as using twitter@mail.com anymore. Instead, they buy own domains and disguise them in a way so that they look like a legit address. A popular technique is placing a sub-domain in front of the actual domain.

Every web address consists of several parts. Basically, it’s this scheme:

Example: https://pixelcode.codeberg.page/phishwarn/index.html

For e-mails, only this part is relevant: subdomain.domain.TLD

The important thing about this is that every domain.tld is unique. There’s only one ebay.com and only one freedom.press.

On the other hand, sub-domains are NOT unique . Every owner of a domain can set any sub-domain he likes and as many sub-domains he likes. That’s why an e-mail domain like this one could be possible: amazon.com.beispiel.de .

Note that the actual domain is NOT amazon.com but beispiel.de instead. However, many users wouldn’t know that amazon.com isn’t the domain and think that the sender actually is Amazon when instead, amazon.com is just two sub-domains: amazon and com.

The real domain is always the last string before the top-level domain. The TLD is something like .com, .net, .gov.uk, .de, .fr etc. If you aren’t sure about this domain stuff, just remember that many dots within an e-mail domain is suspicious = many sub-domains.

High pressure on you

Scammers put high pressure on you, using urgency or severe consequences and pretending to be important authorities.
Read more...
As explained above, scammers try to make you panick by putting high pressure on you. Here’s how they do it:

1. Urgency: If you’re told to do a specific action within e.g. 24 or 48 hours, you should probably wait a minute. Ask yourself: Does the issue really seem that urgent? Would the real sender send such an important message to you via e-mail/SMS etc.? Why wouldn’t they send you a letter to ensure you receive their message?

2. Severe consequences: If you’re threatened with severe consequences like an account ban, or being sued, arrested or fired, it’s the same situation: Would the real sender threaten you like that – especially via e-mail/SMS etc.?

3. Important authority: Many fraudsters claim to be someone like your doctor, the police, the government in general or any other important authority. Stop for a moment and think about whether you’ve ever received a message from the respective sender via the means of communication used. If not: Are you sure that __the police__ would send you an e-mail? Do they even know your address? Why would they choose such an insecure means of communication when they could’ve sent a letter?

At least in the Western world, police would never ever send e-mails or text messages but letters instead. In urgent cases, they would send police officers to talk to you in person.

Vague form of address

Many fraudsters use vague forms of address instead of your actual name because they simply don’t know it. For example, a bank would never use something like “Valued customer...” or “Dear Sir or Madam...” in a message with customer-specific contents. So if the sender doesn’t mention your name but should know it if he was actually legit, then you should be alert.

Poor grammar and spelling

Some phishing messages contain many and severe grammar and spelling mistakes – unlike legit messages from professional companies that ensure they don’t damage their reputation.
Read more...
Legit senders, especially huge companies would most likely pay close attention to anything that could damage their reputation, including poor grammar and spelling. Here are some reasons why phishing texts may be linguistically incorrect:

1. Bad online translation: Many scammers use online translation services of low quality to distribute their phishing messages in different languages. Google Translate’s poor quality has even become an internet meme.

2. Not a native speaker: Many scammers simply come from foreign countries where the victim’s mother tongue isn’t a lingua franca. Many of them also come from poor regions of the world where there’s no proper education in general.

3. Efficiency: It might be more efficient to send out thousands of phishing mails without proper grammar than manufacturing a few high-quality mails.

4. Poor education: People who have to rely on scamming to earn money may have a poor education just like many regular criminals.

However, note that recently, there have been some phishing messages of good grammar. So don’t rely on poor language as a warning signal.

Disguised links

Usually, fraudsters disguise their phishing links by choosing a unsuspicious display texts, e.g. “www.wikipedia.org” as the display text for example.com as the actual link: www.wikipedia.org
Read more...
This is possible because the “Internet language” HTML makes it possible to provide any string of characters with a link, e.g.: Source code. In this case codeberg.org/PhishWarn/PhishWarn is the invisible link and “Source code” is the visible display text.

So scammers choose as the visible display text for example “www.amazon.com/gp/customer-service ”, but link to a phishing site instead, e.g. example.com (this one is obviously harmless). That looks like this: www.amazon.com/gp/customer-service

But how to recognize this? All major browsers will display the link URL at the screen’s bottom when hovering over the link. Try it out: example link

Only concentrate on the URL preview (not on the possibly faked display text) and determine whether it’s trustworthy or not. If you don’t know, do NOT click on the link.
Highly suspicious e-mail address: paypal@notice-access-273.com; vague form of address: “Dear Customer”; severe grammatical mistake: “What the problem’s?”; no sender
An e-mail seemingly from PayPal that can be identified as highly suspicious on closer inspection. Good to know: PayPal ask their users to forward phishing e-mails to spoof@paypal.com.

Foreign language

Some scammers simply don’t know or don’t care about their victims’ mother tongues so that for example a German may receive a French phishing mail from his/her German bank. Why would the bank translate their message into a foreign language that their customer probably doesn’t even speak? That wouldn’t make any sense.

Request for sensitive user data

The fraudsters’ goal is acquiring the victims’ login credentials and other personal data which is why they openly ask about passwords, PIN numbers or TAN codes. Legit companies, however, would never ever ask about sensitive user data in an e-mail or a chat message because that’s highly insecure. Also, customer supports do NOT need the user’s password as they have full access to the company’s user database.

Attachments and calls to action

All phishing messages ask the victim to execute certain instructions, such as klicking on a link or pressing the big shining button. Many scam mails also contain attachments of malicious content (more about that below). Although real emails also instruct the user to do certain things, they are usually far less aggressive or demanding and are not necessarily limited to links and buttons. On the other hand, it is not that common for the real support to send an attachment.

Executable file

Some scammers also try to make the victim download a program or application by telling him/her to download and install an attached .exe, .msi, .app or .apk etc. file. Often, such files are also disguised as harmless (e.g. “dispatchconfirmation.pdf.exe” ) or hidden from spam filters in a ZIP file.
Read more...
Legit senders would almost certainly not do something like that, but instead link to a legit website where you can download a program, if needed at all.

You should never open, download or install anything mentioned in a suspicious e-mail.

Caution! Many executable files are not recognisable as such! Just like phishing websites are disguised with seemingly legit sub-domains, fraudsters try to disguise the file type of attached executable files by naming them for example “billing.pdf.exe” or “holidayphoto.jpg.app” . In this case the actual file types are .exe and .app – and NOT PDF resp. JPG.

Also, may e-mail programs don’t display the file type by default which is why “billing.pdf” would be displayed instead of “billing.pdf.exe” – which fatally doesn’t look suspicious at all!

Moreover, some scammers hide their executable files inside of .zip archives to prevent e.g. spam filters from detecting the suspicious .exe attachment. If you’re seeing a ZIP file attached you should take extra care!
How to prevent being phished?

Here are some online safety measures that you should take immediately. Don’t wait until it’s too late!

Other Resources
Federal Trade Commission English How To Recognize and Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. But there are several things you can do to protect yourself.

consumer.ftc.gov
NCSC's Logo English Dealing with suspicious emails, phone calls and text messages

How to spot the most obvious signs of a scam, and what to do if you've already responded.

ncsc.gov.uk
Screenshot einer Phishing-Mail German German Beispiele für Phishing-Versuche

Die Verbraucherschutzzentrale zeigt eine Liste kürzlicher Phishing-Versuche, die du dir unbedingt ansehen solltest.

verbraucherzentrale.de