Spot the Phish: PayPal, Netflix & Uber

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

Image 1 details: The email contains a malicious attachment with .js extension. Note that the attachment tries to show it’s a PDF file (look at the icon of the file). But the extension ends with a “.js.” This is a malicious attachment typical of a phishing email.

PayPal Phishing Attempt 1 Explained

Image 2 details: When you mouse-over the hyperlink, you can see that it is phishy. Also, there is a sense of urgency in the language. The email salutation is generic as well. This raises cybersecurity alarm bells.

Netflix 2 Phishing Attempt Explained

Image 3 details: The sender email ID is phishy. The salutation is completely out of line and there are grammatical mistakes. Phishing email.

Netflix 3 Phishing Attempt Explained

Image 4 details: The hyperlink is a legitimate uber website link. Although you should always have high cybersecurity awareness, there aren’t any typical red flags in the email.

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

log management

How A Log Management Assessment Can Prepare Your Organization for a Cyber Attack

This article delves into the significance of log analysis in a forensic readiness assessment and outlines best practices for organizations to optimize their log management strategies …
Business Impact Assessments

Importance of Business Impact Assessments

In the event of a data breach, Business Impact Assessments will help your organization prioritize recovery steps and get back to business faster …
cybersecurity incident response

How to Choose the Right Tabletop Scenario for Incident Response Testing

To effectively combat these threats, organizations must invest in robust cybersecurity incident response strategies …