Which of the emails from financial institutions are phishing attempts? Spot the Phish

Spot the Phishing Attempt

The images displayed below are a combination of phishing and real emails. Spot the phish! Click on the images to zoom in.

Spoiler Alert: Answers are below.

 

Answer: All the emails are phishes! Let’s take a look below…

 

Image 1 details: First things first: if a message isn’t personalized with your name or a specific identifier such as a verified (partial) account number, be suspicious. Greetings like “Dear Customer” suggest the sender is trying to catch anyone who happens to receive the email - and has no idea whether the recipient really has a Bank of America account. Also, the footer of the email says ‘Bank of American’ and the copyright says 2018 while the email was sent in 2019.

Bank of America Phishing Email Explained 1

Image 2 details: Check out the sender email ID. The domain should be Citi’s domain. The hacker sent the email from @secure.com to try to make it look real and secure. It’s a clear phish!

CitiBank Phishing Email Explained 2


Image 3 details:
Here comes another malicious hyperlink! The sender was clever enough to spell Wells Fargo correctly in the URL but if you hover over the hyperlink, you’ll see the spoofed URL ‘welsfargo.com.’ Always remember to mouse-over links to see where the sender is really trying to take you.

Wells Fargo Phishing Email Explained 3

 

Image 4 details: This is a clear phish! The chances of a reputable brand like Chase sending out grammatically incorrect emails are pretty slim. Although the attachment appears legit, it contains malicious code.

Chase Phishing Email Explained 4

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

log management

How A Log Management Assessment Can Prepare Your Organization for a Cyber Attack

This article delves into the significance of log analysis in a forensic readiness assessment and outlines best practices for organizations to optimize their log management strategies …
Business Impact Assessments

Importance of Business Impact Assessments

In the event of a data breach, Business Impact Assessments will help your organization prioritize recovery steps and get back to business faster …
cybersecurity incident response

How to Choose the Right Tabletop Scenario for Incident Response Testing

To effectively combat these threats, organizations must invest in robust cybersecurity incident response strategies …