SPOT THE PHISH - AMAZON 1

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Can you tell which of them are phishing attempts? Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Image 1 details: The email overall appears legitimate. It does not contain any spelling mistakes; it has a hyperlink which appears to be real (leads to the amazon.com domain). It is always good to have heightened cybersecurity awareness, but no red flags here.

Image 2 details: The email depicts a phony sender name and a non-US date format. The IP address shown is fake and there is sense of urgency in the email.  The email contains spelling and grammar errors, looks like a phishing email.

Fake Amazon Email Red Flags 2

 

Image 3 details: The image has an actual amazon.com domain link and there are no other phishy red flags.

Image 4 details: In the email, Amazon is purportedly providing the customer a refund to lure him/her to click on the given link. Also, it asks for the billing address at the time of purchase. This is not normal cybersecurity protocol if you’ve shopped online before with Amazon. Regarding the reference code, it’s always a good idea to do a quick Google search for the code to see if it is a real reference code. Often, search results will tell you if a code is legitimate, as there would be other discussions going on about it. Looks like an attempted phishing attack.

Fake Amazon Email Red Flags 4

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Business Impact Assessments

Importance of Business Impact Assessments

In the event of a data breach, Business Impact Assessments will help your organization prioritize recovery steps and get back to business faster …
cybersecurity incident response

How to Choose the Right Tabletop Scenario for Incident Response Testing

To effectively combat these threats, organizations must invest in robust cybersecurity incident response strategies …
pci certification steps

Step by Step Guide to Achieving PCI Certification for PCI DSS 4.0

The pathway to PCI certification in PCI DSS 4.0 involves several critical deliverables, each designed to ensure organizations meet rigorous security standards effectively and sustainably …