Spot the Phish Website - Costco

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Can you tell which of them are phishing attempts? Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Image 1 details: The image contains a phishing hyperlink that spells Costco as Costoco, a huge cybersecurity awareness red flag.

Costco 1 Phishing Attempt and Explanation

Image 2 details: Michelin is spelled wrong.

Costco 2 Phishing Attempt and Explanation

Image 3 details: The image has a phishing barcode and a QR code. There are free barcode reader verification websites available online. For example: https://online-barcode-reader.inliteresearch.com/. The barcode and QR code used in the image below turn up as phishy when verified online, this one looks like a phishing attack.

Costco 3 Phishing Attempt with explanation

Image 4 details: The hyperlink is a legitimate Costco website link. There aren’t any typical red flags in the email and it passes all cybersecurity checks.

 

Boost Your Cybersecurity with ERMProtect

No matter how much an organization improves its technical defenses, employees can fall victim to phishing attacks and other hacker lures. ERMProtect™ arms employees with the tools and security awareness they need to protect themselves and their organizations from cyber attacks. To speak with an expert on our cybersecurity team please call (800) 259-9660 or click here to schedule a free demo.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

pci dss in the cloud

How to Achieve PCI Compliance in the Cloud as Security Controls Evolve

The integration of cloud services with PCI DSS compliance is particularly crucial for enterprises that handle sensitive payment card information …
Digital Forensics Investigation

What Are the 5 Stages of a Digital Forensics Investigation?

In this article, we delve deeply into the five stages of a digital forensics investigation and provide tips on how to select the right digital forensics company …
Comprehensive Guide to Penetration Testing

A Comprehensive Guide to Penetration Testing – Types, Methods, Benefits and Best Practices

This penetration testing guide explains the different types of penetration testing, their benefits, and their purpose …