Spot the Phish - Black Friday

Spot the Phish: Black Friday Scams

The images displayed below are a combination of images which are phishing attacks and real images. Spot which ones are real and which ones are phony:

Spoiler Alert: Answers are below.

 

Answer: Image 2 and 4 are phishes. Let’s see how:

Image 1 details: The email offer has no obvious red flags or signs of a cyber attack, although you should be sure to mouse-over the URL to be sure it shows the company’s legitimate email address, not a phishy one. This one is  genuine.

 

Image 2 details: This is a Black Friday “Deal Reveal” email. It passes almost all of our typical checks – the hyperlinks, the logo, the grammar, and the overall look-and-feel seem okay. But take a look at that QR code on the top-right corner. You’ll realize it’s a fake when you try to check out. Once you come across even one red flag that indicates a phishing attack, that’s enough for you to stop and discard this one completely. It’s a phish!

Sephora Black Friday Phishing Scam Red Flags 2

Image 3 details: This looks like an early Black Friday sale notification. No real, visible red flags here. Always keep your guard up, regardless. This one looks genuine.

 

Image 4 details: This one is tricky! Almost everything looks in order. The only red flag here is the really outdated logo … and that’s easy to miss! Many times, hackers will try to keep things clean in the email, message, or notification they send to you. They’ll want you to first click and then try to hijack your process flow along the way. Hasty mistakes like an outdated logo can save you possible pain from a cyber attack down the road. This one is a phish!

Best Buy Black Friday Phishing Scam Red Flags 4

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

PCI DSS Certification

The Most Common Problems with PCI DSS Certification Implementation

This article dissects the most common problems organizations face with PCI DSS certification implementation and the solutions to overcome them …
IT Risk Assessment

Top 10 IT Audit Risks in 2025 and Using IT Risk Assessments to Mitigate Them

This article explores the top 10 IT audit risks for 2025 and provides actionable strategies for mitigating them, notably the use of IT risk assessments …
Business Impact Analysis

Why Performing a Business Impact Analysis is Important for Banks

A look into unique challenges banks face when conducting a BIA, real-world scenarios encountered during BIAs and IT risk assessments, practical steps involved in performing a BIA, and the common pitfalls to avoid during the …