Count the Phish: LinkedIn Email

Count the Phish: LinkedIn Email

The LinkedIn email below is an attempted phishing attack. There are quite a few red flags in there. Let’s see if you can find them all!

LinkedIn Phishing Email - Can you spot all the red flags?

 

Answer:

There are 6 red flags in total.

  1. The date is in a non-US format.
  2. The subject of the email has one grammatical and one spelling
  3. In the body of the email, the very first hyperlink has a phishy domain name. It says ‘www.linkdin.com,’ so as you can see the letter “e” is missing.
  4. The writeup in the center of the email also has a grammatical error.
  5. And lastly, the footer of the email has a spelling mistake.

When reviewing an email, never rely on one indicator alone. Review the email as a whole and see if it sets off any alarms in your mind, which may look like a possible phishing attack.

LinkedIn Phishing Email Red Flags

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Aligning Your Incident Response Plan with NIST SP 800-61 Rev. 3

Aligning Your Incident Response Plan with NIST SP 800-61 Rev. 3

This article offers key updates in the latest NIST guidance, why they’re significant, and what practical steps you can take to update your organization’s incident response plan …
CEO Checklist: How To Know If Your Organization Is Cyber Secure

CEO Checklist: How To Know If Your Organization Is Cyber Secure

This CEO Checklist is a starting point for executive oversight – to spot gaps, test what your team is telling you, & prioritize where to invest attention/budget …
Guide to Penetration Testing Services

Guide to Penetration Testing and Advanced Techniques in Penetration Testing Services

Penetration testing is the interactive nature of the control evaluation. Unlike static assessments, penetration testing services involve dynamic interaction with the system …