SPOT THE PHISH - AMAZON 1

Spot the Phish: Amazon

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Can you tell which of them are phishing attempts? Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Image 1 details: The email overall appears legitimate. It does not contain any spelling mistakes; it has a hyperlink which appears to be real (leads to the amazon.com domain). It is always good to have heightened cybersecurity awareness, but no red flags here.

Image 2 details: The email depicts a phony sender name and a non-US date format. The IP address shown is fake and there is sense of urgency in the email.  The email contains spelling and grammar errors, looks like a phishing email.

Fake Amazon Email Red Flags 2

 

Image 3 details: The image has an actual amazon.com domain link and there are no other phishy red flags.

Image 4 details: In the email, Amazon is purportedly providing the customer a refund to lure him/her to click on the given link. Also, it asks for the billing address at the time of purchase. This is not normal cybersecurity protocol if you’ve shopped online before with Amazon. Regarding the reference code, it’s always a good idea to do a quick Google search for the code to see if it is a real reference code. Often, search results will tell you if a code is legitimate, as there would be other discussions going on about it. Looks like an attempted phishing attack.

Fake Amazon Email Red Flags 4

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Cybersecurity Blind Spot Why Physical Security Is Now the Easiest Way In

Cybersecurity Blind Spot: Why Physical Security Is Now the Easiest Way In

Physical security testing has become a crucial part of a modern, comprehensive defense strategy …
Red, Blue, & Purple Teaming

Red, Blue, & Purple Teaming: Unified Strategy Organizations Can’t Ignore

One way of strengthening defenses is through a multifaceted security testing approach known as Red, Blue, and Purple Teaming …
Quantum Computing

Quantum Computing Puts Today’s Encryption at Risk

Security experts warn that hackers are already harvesting encrypted data to decrypt later, making quantum safe cryptography an urgent priority for every sector …