Spot the Phish - Black Friday

Spot the Phish: Black Friday Scams

The images displayed below are a combination of images which are phishing attacks and real images. Spot which ones are real and which ones are phony:

Spoiler Alert: Answers are below.

 

Answer: Image 2 and 4 are phishes. Let’s see how:

Image 1 details: The email offer has no obvious red flags or signs of a cyber attack, although you should be sure to mouse-over the URL to be sure it shows the company’s legitimate email address, not a phishy one. This one is  genuine.

 

Image 2 details: This is a Black Friday “Deal Reveal” email. It passes almost all of our typical checks – the hyperlinks, the logo, the grammar, and the overall look-and-feel seem okay. But take a look at that QR code on the top-right corner. You’ll realize it’s a fake when you try to check out. Once you come across even one red flag that indicates a phishing attack, that’s enough for you to stop and discard this one completely. It’s a phish!

Sephora Black Friday Phishing Scam Red Flags 2

Image 3 details: This looks like an early Black Friday sale notification. No real, visible red flags here. Always keep your guard up, regardless. This one looks genuine.

 

Image 4 details: This one is tricky! Almost everything looks in order. The only red flag here is the really outdated logo … and that’s easy to miss! Many times, hackers will try to keep things clean in the email, message, or notification they send to you. They’ll want you to first click and then try to hijack your process flow along the way. Hasty mistakes like an outdated logo can save you possible pain from a cyber attack down the road. This one is a phish!

Best Buy Black Friday Phishing Scam Red Flags 4

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

soc 2 auditor

Top 10 Tips for Choosing a SOC 2 Auditor

Choosing a SOC 2 auditor can seem like a complicated process, but keep in mind that the most important factor is picking someone who will be a valuable partner …
cryptocurrency compliance

What Does Crypto Compliance Mean Today?

Compliance helps protect crypto investments. Here we discuss popular crypto compliance standards to be aware of …
types of pen tests

Types of Penetration Testing

Penetration tests are an effective defense mechanism because they mimic real-world attacks. Here the the pen test types you need to know …