Which of the emails from financial institutions are phishing attempts? Spot the Phish

Spot the Phishing Attempt

The images displayed below are a combination of phishing and real emails. Spot the phish! Click on the images to zoom in.

Spoiler Alert: Answers are below.

 

Answer: All the emails are phishes! Let’s take a look below…

 

Image 1 details: First things first: if a message isn’t personalized with your name or a specific identifier such as a verified (partial) account number, be suspicious. Greetings like “Dear Customer” suggest the sender is trying to catch anyone who happens to receive the email - and has no idea whether the recipient really has a Bank of America account. Also, the footer of the email says ‘Bank of American’ and the copyright says 2018 while the email was sent in 2019.

Bank of America Phishing Email Explained 1

Image 2 details: Check out the sender email ID. The domain should be Citi’s domain. The hacker sent the email from @secure.com to try to make it look real and secure. It’s a clear phish!

CitiBank Phishing Email Explained 2


Image 3 details:
Here comes another malicious hyperlink! The sender was clever enough to spell Wells Fargo correctly in the URL but if you hover over the hyperlink, you’ll see the spoofed URL ‘welsfargo.com.’ Always remember to mouse-over links to see where the sender is really trying to take you.

Wells Fargo Phishing Email Explained 3

 

Image 4 details: This is a clear phish! The chances of a reputable brand like Chase sending out grammatically incorrect emails are pretty slim. Although the attachment appears legit, it contains malicious code.

Chase Phishing Email Explained 4

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Principle of Least Privilege (PoLP)

Principle of Least Privilege Requirements: PCI Compliance Services To Strengthen Cybersecurity

This article explores how PCI DSS 4.0.1 enhances IT risk assessment, cybersecurity risk assessment, and penetration testing solutions, while also providing guidance on implementing the Principle of Least Privilege to utilize PCI compliance services to …
FFIEC CAT

What Banks Need to Do Now to Replace the FFIEC’s Cybersecurity Assessment Tool (CAT)

This article explains alternative frameworks banks can use to replace the FFIEC CAT and remain compliant …
Cyber Insurance Audits: What IT Auditors Need to Know

Cyber Insurance Audits: What IT Auditors Need to Know

This article explores the type of cyber insurance policies companies in the marketplace and the role of IT auditors in making sure that cybersecurity standards are met …