Spot the Phish: PayPal, Netflix & Uber

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

Image 1 details: The email contains a malicious attachment with .js extension. Note that the attachment tries to show it’s a PDF file (look at the icon of the file). But the extension ends with a “.js.” This is a malicious attachment typical of a phishing email.

PayPal Phishing Attempt 1 Explained

Image 2 details: When you mouse-over the hyperlink, you can see that it is phishy. Also, there is a sense of urgency in the language. The email salutation is generic as well. This raises cybersecurity alarm bells.

Netflix 2 Phishing Attempt Explained

Image 3 details: The sender email ID is phishy. The salutation is completely out of line and there are grammatical mistakes. Phishing email.

Netflix 3 Phishing Attempt Explained

Image 4 details: The hyperlink is a legitimate uber website link. Although you should always have high cybersecurity awareness, there aren’t any typical red flags in the email.

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …
Web Application Penetration Testing Services

Common Issues in Web Application Penetration Testing Services

Web applications are now ripe targets for hackers. Here we take a look at a few hacker attacks on web applications & how penetration testing services are critical …
Implementing NIST Risk Assessments

Implementing NIST Risk Assessments: A Step-by-Step Approach

This step-by-step guide will help organizations navigate the NIST risk assessment process effectively, leveraging the expertise of risk assessment companies and cybersecurity consulting services …