Learn About Phishing

Understand how phishing attacks work, the different types you may encounter, and how to protect yourself and your organisation.

🎣 What is Phishing?

Phishing is a form of social engineering where attackers impersonate trusted entities banks, technology companies, government agencies, or colleagues to deceive victims into revealing sensitive information or taking a harmful action.

The term comes from "fishing" casting a wide net hoping someone takes the bait. Attackers send millions of messages knowing even a small percentage of responses is profitable.

Modern phishing has become highly sophisticated. Attackers now embed malicious content inside images to bypass traditional text-based email filters, register lookalike domains that are visually identical to legitimate ones, and craft psychologically compelling messages using urgency, fear, and authority.

Real Example

"Your Apple ID has been locked due to suspicious activity. Verify your account within 24 hours to avoid permanent suspension." sent from security@apple-verify.top

🚩 Immediate Red Flags

  • Sender domain doesn't match the company (apple-verify.top vs apple.com)
  • Urgency "24 hours", "immediately", "action required"
  • Requests for passwords, card numbers, or personal details
  • Generic greeting rather than your actual name

🧾 Invoice & Billing Scams

Invoice scams are among the most common phishing attacks. Attackers send fake invoices typically for software subscriptions, antivirus renewals, or tech support services claiming a charge has already been made to your account.

The goal is to panic you into calling a phone number, where fraudsters will attempt to gain remote access to your computer or convince you to make a payment to "cancel" the fictional subscription.

Common brands impersonated

Geek Squad (Best Buy), Norton, McAfee, PayPal, Amazon, Microsoft, Apple. These companies are chosen because they have broad recognition and large customer bases.

Typical Message

"Your Norton AntiVirus subscription has been automatically renewed for $299.99. If you did not authorise this charge, call our helpline immediately on +1 (805) 849-2294 within 24 hours."

🚩 Red Flags for Invoice Scams

  • You never subscribed to the service mentioned
  • The email asks you to call a phone number rather than visit a website
  • High-pressure urgency you "must act within 24 hours"
  • The invoice amount is unusually high to create panic
  • Poor formatting, grammar errors, or inconsistent branding
  • Sender is a generic email address (gmail, yahoo) not a corporate domain

✅ What To Do

  • Do not call any phone number in the email
  • Log in directly to the real company's website (type it yourself don't click links)
  • Check your actual bank statements no charge will appear for a fake invoice
  • Report the email as phishing to your email provider

🔑 Credential Harvesting

Credential harvesting attacks direct victims to fake login pages that look identical to the real thing. When you enter your username and password, the attacker captures them instantly and uses them to access your real account.

These attacks target banking, email, social media, and cloud services. Once an attacker has your credentials they may change your password, drain accounts, or sell the credentials to other criminals.

How the deception works

Attackers register domains designed to look legitimate at a glance paypa1.com (using a 1 instead of l), secure-paypal-login.com, or paypal.com.account-verify.xyz. Combined with a perfect visual copy of the real login page, many victims don't notice anything wrong.

🚩 Red Flags for Credential Harvesting

  • URL doesn't exactly match the official domain
  • HTTP instead of HTTPS (though HTTPS alone doesn't guarantee safety)
  • Unexpected login request you didn't try to log in
  • Login page requests unusual information (security questions, full card number)
  • Email link takes you to a different domain than expected

✅ Protection

  • Always type website addresses directly never click email links to login pages
  • Enable two-factor authentication on all important accounts
  • Use a password manager it won't autofill on fake domains
  • Check the full URL carefully before entering any credentials

📦 Delivery Scams

Delivery scams are particularly prevalent in Ireland. Attackers impersonate An Post, DHL, FedEx, or other courier services claiming a parcel is being held due to an unpaid customs fee or failed delivery attempt.

The victim is asked to pay a small fee (typically €1-€3) to release the parcel. This small amount makes it feel low-risk, but the real goal is to capture your card details for larger fraudulent charges later.

Typical An Post Scam Message

"Your parcel has been held at our depot due to an unpaid customs fee of €2.99. Please pay within 48 hours to avoid return to sender. Track your parcel: [malicious link]"

🚩 Red Flags for Delivery Scams

  • You aren't expecting a parcel
  • Request for payment via a link in the message
  • Sender is not the official domain (anpost.com, dhl.com)
  • Unusual sense of urgency about an "imminent return"
  • Link goes to a non-official domain

💼 Business Email Compromise (BEC)

BEC is the most financially damaging form of phishing. Attackers impersonate senior executives, finance departments, or trusted vendors to authorise fraudulent wire transfers or change payment details.

Unlike other phishing, BEC emails often contain no links, no attachments, and no obvious red flags they are designed to appear as normal business communications. The FBI reports BEC caused over $2.9 billion in losses in 2023 alone.

Common BEC scenarios

CEO Fraud: An email appearing to come from the CEO asks the finance team to urgently transfer funds to a new account. "As discussed, please process the payment of €45,000 to our new vendor details attached."

Vendor Payment Change: A supplier notifies you their bank details have changed and requests future payments to a new account. The email appears legitimate but originates from an attacker who has compromised or spoofed the vendor's email.

✅ Protection Against BEC

  • Always verify payment changes via a separate, known phone number never the one in the email
  • Implement a dual-approval process for wire transfers
  • Be suspicious of any "urgent" payment requests from executives
  • Check the actual reply-to address, not just the display name

🏦 Brand Impersonation

Brand impersonation involves copying the logos, colour schemes, typography, and tone of trusted organisations to make phishing content appear legitimate. Almost every major brand is impersonated Apple, Microsoft, PayPal, your bank, Government services.

Attackers invest significant effort in making impersonation convincing. Modern phishing emails are often visually indistinguishable from genuine communications the only difference may be a single character in the sender domain.

🚩 How to verify the real sender

  • Hover over links before clicking check where they actually go
  • Check the full sender email address, not just the display name
  • "Apple" as the display name means nothing check the @domain
  • Apple uses @apple.com not @apple-security.com or @icloud-verify.net
  • Your bank will never ask for your full PIN or password by email

🔒 Sextortion

Sextortion emails claim the attacker has compromising video footage of the victim and threaten to send it to their contacts unless a cryptocurrency payment is made. These emails are almost always entirely fabricated the attacker has no footage.

The emails are sent in bulk and often include one of the victim's real passwords (obtained from historic data breaches) to appear credible. This is called a "credential stuffing" technique designed to create panic.

✅ If You Receive a Sextortion Email

  • Do not pay it will not stop further demands
  • Do not reply it confirms your email is active
  • Change the password mentioned in the email if you still use it
  • Report it to your national cybercrime unit (An Garda Síochána in Ireland)
  • Check haveibeenpwned.com to see if your email appears in known breaches

💼 Job Scams

Job scams impersonate legitimate companies offering attractive employment opportunities particularly targeting students and recent graduates. The email appears to come from a real company's talent acquisition team and offers remote, flexible, high-paying roles.

The goal is to eventually request bank details for "direct deposit setup", advance payments for equipment, or to extract personal identification documents under the guise of onboarding.

Typical Job Scam Message

"Hi, we've been following your work and we're impressed. Spotify is hiring for several remote positions that could be a perfect fit. We'd love to schedule a call our talent acquisition team is available this week."

🚩 Red Flags for Job Scams

  • Unsolicited job offer you didn't apply for
  • Sender domain doesn't match the company (careerplug.com ≠ spotify.com)
  • Offer seems too good very high salary, no experience required
  • Requests for bank details early in the process
  • Asks you to purchase equipment upfront with a promise of reimbursement

🔍 How to Spot Phishing

Use this checklist whenever you receive an unexpected email asking you to take an action click a link, make a payment, verify your details, or open an attachment.

📧

Check the sender domain

The display name can say anything. The actual email address after @ is what matters. apple.com vs apple-security.com are very different.

🔗

Hover before you click

Hover over any link to see the actual destination URL in your browser's status bar. Does it match what you'd expect?

Beware of urgency

Phishing relies on panic. "24 hours", "immediately", "act now" are designed to make you act before you think.

🔐

Legitimate organisations won't ask

Your bank, Apple, Google none of them will email you asking for your password, PIN, or full card details.

📎

Be cautious with attachments

Unexpected PDF or Word documents can contain malware. Verify with the sender via a separate channel before opening.

🔒

Check authentication signals

SPF, DKIM, and DMARC failures mean the email may not be from who it claims. Your email client may show a warning.

🛡️ What To Do If You Receive a Phishing Email

1

Don't click anything

Do not click links, open attachments, or call phone numbers in the email. Even clicking "unsubscribe" can confirm your address is active.

2

Report it as phishing

Use your email client's "Report phishing" option. In Gmail use the three dots → Report phishing. In Outlook use the Phish Alert button if available.

3

Forward to the relevant body

In Ireland, forward phishing emails to report@phishing.gov.ie. In the UK, forward to report@phishing.gov.uk. For An Post scams, report to An Post directly.

4

If you clicked a link or submitted details

Change your password immediately on the real website (typed directly). Contact your bank if financial details were shared. Enable two-factor authentication. Check haveibeenpwned.com.

5

Analyse the sample

Upload the image or .eml file to ImageAware+ for a detailed forensic analysis. This can help confirm it's phishing and identify what indicators were present.