{"id":58858,"date":"2020-06-15T13:09:06","date_gmt":"2020-06-15T13:09:06","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=58858"},"modified":"2024-08-20T05:53:28","modified_gmt":"2024-08-20T05:53:28","slug":"how-to-spot-a-phishing-email","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/","title":{"rendered":"How to Spot a Phishing Email?"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><blockquote class=\"note_alert\">\n<p><strong>Summary<\/strong>: Ransomware attacks, malware infections, man-in-the-middle attacks, etc., are some of the common cyber threats faced by organizations today. However, the most prevalent and dangerous cyber threat is phishing. Unfortunately, due to a lack of knowledge about email phishing, most people fall victim to such scams. According to a Verizon report, phishing accounts for 32% of all cyberattacks. In this blog, we take a closer look at email phishing and discuss some tell tale signs (with examples) that can help you identify a phishing email quickly.<\/p>\n<\/blockquote><h2 class=\"wp-block-heading\" id=\"what-is-email-phishing?\"><strong><strong>What is Email Phishing?<\/strong><\/strong><\/h2><p>Email phishing is a social engineering attack in which a cybercriminal uses a disguised email to steal login credentials, business documents, trade secrets, etc., from a recipient or a group of recipients. The sender masquerades as a trusted entity, like a government agency or a known organization, to trick the recipient into sharing sensitive information.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\" alt=\"Stellar\" class=\"wp-image-58864 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg 1000w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email-300x180.jpg 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><p>However, you can quickly identify phishing emails and protect yourself by being careful. The following are some tell tale signs that can help you spot a phishing email:&nbsp;<\/p><h3 class=\"wp-block-heading\" id=\"h-1-message-received-from-public-email-domain\"><strong>1. Message Received from Public Email Domain<\/strong><\/h3><p>Almost every reputed organization has its email domain and company account. So, if you have received an email from IRS whose website name is&nbsp;<strong>www.irs.gov<\/strong>, the email address should be&nbsp;<strong>contact@irs.gov&nbsp;<\/strong>or&nbsp;<strong>support@irs.gov<\/strong>&nbsp;(both end with&nbsp;<strong>&ldquo;@irs.gov<\/strong>&rdquo;). Generally, a reputed organization doesn&rsquo;t send messages from a public email domain. If you receive an email from a reputed company or organization, but the email address has a public email domain, i.e., it ends with&nbsp;<strong>@gmail.com, @outlook.com<\/strong>, etc., then it can be a sign of a phishing attack.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"475\" class=\"wp-image-58865 apply-gradient-on-post-images\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Impersonating-PayPal-1024x475.png\" alt=\"A Phishing Email Impersonating PayPal\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Impersonating-PayPal-1024x475.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Impersonating-PayPal-300x139.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Impersonating-PayPal-768x356.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Impersonating-PayPal.png 1162w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption><em><strong>Figure 1:<\/strong> A Phishing Email Impersonating PayPal<\/em><\/figcaption><\/figure><p><strong><em>Figure 1<\/em><\/strong>&nbsp;illustrates a phishing email in which&nbsp;<strong>paypal.mailer@outlook.com<\/strong>&nbsp;sends the message. Note how the sender uses&nbsp;PayPal&nbsp;in the username to make it look legitimate. The sender even applied PayPal&rsquo;s branding in the email content with the official logo and blue login button (blue is the primary color in PayPal&rsquo;s branding) to trick the message receiver. However, the domain name&nbsp;<strong>@outlook.com<\/strong>&nbsp;is a dead giveaway. An official PayPal email will always have an email address that ends with&nbsp;<strong>@paypal.com<\/strong>.<\/p><h3 class=\"wp-block-heading\" id=\"h-2-misspelled-domain-names\"><strong>2. Misspelled Domain Names<\/strong><\/h3><p>Some cybercriminals buy domain names similar to trusted ones to make the deceiving easier. For instance, they may buy a domain name, like&nbsp;<strong>www.linked-in.com<\/strong>&nbsp;or&nbsp;<strong>www.linkeden.com<\/strong>. Both domain names are similar to LinkedIn&rsquo;s official domain name&nbsp;<strong>www.linkedin.com<\/strong>. They can then send an email from an address that looks like&nbsp;<strong>support@linked-in.com<\/strong>&nbsp;to mislead the recipient. Henceforth, you should always check the spelling of the email address when you receive a suspicious message before you respond.<\/p><h3 class=\"wp-block-heading\" id=\"h-3-malicious-web-pages\"><strong>3. Malicious Web Pages<\/strong><\/h3><p>Sometimes, cybercriminals send emails containing legitimate-looking URLs that trick the user into sharing personal, confidential, and financial information. When you click such a malicious URL, it usually takes you to a landing page, where you are asked to provide some sensitive information. This landing page can also give you signals about the phishing attack. You can refer to the sample landing page in&nbsp;<em><strong>Figure 2<\/strong><\/em>.<\/p><figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"856\" height=\"476\" class=\"wp-image-58881 apply-gradient-on-post-images\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Fake-Twitter-Login-Page-3.png\" alt=\"A Landing Page with Fake Twitter URL\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Fake-Twitter-Login-Page-3.png 856w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Fake-Twitter-Login-Page-3-300x167.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Fake-Twitter-Login-Page-3-768x427.png 768w\" sizes=\"auto, (max-width: 856px) 100vw, 856px\" \/><figcaption><em><strong>Figure 2: <\/strong>A Landing Page with Fake Twitter URL<\/em><\/figcaption><\/figure><p>The following are a few signs that suggest it is a malicious web page:<\/p><ul class=\"wp-block-list\">\n<li>The web address is different from the official domain address of the company. At first glance, it looks like the login page of Twitter, but if you take a closer look at the URL, you can see that the domain name is&nbsp;<strong>http:\/\/tfitter.com<\/strong>&nbsp;and not&nbsp;<strong>http:\/\/twitter.com<\/strong>.<\/li>\n<\/ul><ul class=\"wp-block-list\">\n<li>Since the primary goal of malicious pages is to collect sensitive data, like login credentials, they often lack visual details like footers and headers (refer to&nbsp;<strong><em>Figure 3<\/em><\/strong>). Cybercriminals don&rsquo;t always bother about making a landing page aesthetically pleasant or believable. There may be typographical and grammatical mistakes in the content that a victim won&rsquo;t usually expect on the websites of reputed companies.<\/li>\n<\/ul><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"496\" class=\"wp-image-58873 apply-gradient-on-post-images\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Landing-Page-with-no-Visual-Details-1024x496.png\" alt=\"A Landing Page with no Visual Details\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Landing-Page-with-no-Visual-Details-1024x496.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Landing-Page-with-no-Visual-Details-300x145.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Landing-Page-with-no-Visual-Details-768x372.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Landing-Page-with-no-Visual-Details.png 1357w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption><em><strong>Figure 3:<\/strong> A Landing Page with no Visual Details<\/em><\/figcaption><\/figure><h3 class=\"wp-block-heading\" id=\"h-4-discrepancies-in-social-media-profile\"><strong>4. Discrepancies in Social Media Profile<\/strong><\/h3><p>LinkedIn messages and emails are also used by cybercriminals to launch phishing attacks. Refer to&nbsp;<em><strong>Figure 4<\/strong><\/em>, where a LinkedIn user has received an email from a threat actor who has disguised himself as a Wells Fargo representative.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"770\" class=\"wp-image-58874 apply-gradient-on-post-images\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Sent-Via-LinkedIn-1024x770.png\" alt=\"A Phishing Email Sent Via LinkedIn\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Sent-Via-LinkedIn-1024x770.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Sent-Via-LinkedIn-300x226.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Sent-Via-LinkedIn-768x578.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/A-Phishing-Email-Sent-Via-LinkedIn.png 1179w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption><em><strong>Figure 4: <\/strong>A Phishing Email Sent Via LinkedIn<\/em><\/figcaption><\/figure><p>In this example, the attacker has created a fake <strong><em>Wells Fargo<\/em><\/strong> account to send a phishing message through LinkedIn&rsquo;s InMail. The message appears genuine, even though it contains a malicious URL, as LinkedIn itself delivers it. As you can see, no suspicious email addresses or domain names can be seen here. Also, the footer links for &ldquo;<strong>Reply<\/strong>&rdquo; and &ldquo;<strong>Not Interested<\/strong>&rdquo; buttons, etc., are generated by LinkedIn itself. These details make the message look authentic and make it easier for the hacker to scam the receiver.<\/p><p>To verify such kind of phishing attack, you can check the LinkedIn profile of the sender. The following are some common signs of a fake account:<\/p><ul class=\"wp-block-list\">\n<li>Beware of incomplete profiles that lack basic details, like experience, summary, recommendations, etc. Fraudsters usually don&rsquo;t bother to fill in such details.<\/li>\n\n\n\n<li>The profile image may be irrelevant or would be of poor quality.<\/li>\n\n\n\n<li>There may be limited connections.<\/li>\n\n\n\n<li>Spelling errors or the use of poor grammar in profile details.<\/li>\n\n\n\n<li>Few or no interactions with other users.<\/li>\n<\/ul><h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2><p>Phishing emails are dangerous on many levels for an organization or business. For example, it takes just one unaware employee to click a malicious URL to initiate a malware attack that may infect all the company servers or compromise the company&rsquo;s account, resulting in a massive data breach. So, all your company&rsquo;s incoming and outgoing emails must be monitored for anomalies, malicious links, and&nbsp;details. Also, it is vital to provide cyber hygiene training and conduct awareness programs to inform the employees about email phishing attacks and how they can spot such phishing emails.<\/p><p>Suppose you have encountered an email phishing attack in your company and want the forensic analysis of emails. In that case, a specialized eDiscovery software for email investigation like&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>&nbsp;can be of great help. The software offers advanced email search functionality and supports&nbsp;<strong>deleted email recovery<\/strong>&nbsp;across&nbsp;<strong>more than 25<\/strong>&nbsp;file formats, including&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-analysis-of-exchange-edb-files\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>EDB<\/strong><\/a><strong>,&nbsp;<\/strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PST<\/strong><\/a><strong>, OST, DBX, NSF, MBOX, OLM, TBB, EML<\/strong>, etc., through a single user interface. Furthermore, this tool preserves the evidence in a legally acceptable format such as&nbsp;<strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">PST<\/a><\/strong>, MSG, HTML, PDF, EML, etc. In case it turns out that there are large scale after-effects of the cyberattacks, <strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/bulk-email-forensics-for-legal-professionals\/\" target=\"_blank\" rel=\"noreferrer noopener\">bulk email forensics<\/a><\/strong>&nbsp;is required at the organization level.<\/p><p class=\"has-very-light-gray-background-color has-background\"><strong>Are you interested in checking out the features of Stellar Email Forensic software?&nbsp;<\/strong><a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software\/buy-now.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><strong> now.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Ransomware attacks, malware infections, man-in-the-middle attacks, etc., are some of the&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\">Continue reading <span class=\"screen-reader-text\">How to Spot a Phishing Email?<\/span><\/a><\/p>\n","protected":false},"author":39,"featured_media":58864,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1245],"tags":[1240,1418,1409,1411,3391,3429,3428],"class_list":["post-58858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-forensics","tag-email-forensics","tag-email-phishing","tag-email-security","tag-email-spoofing","tag-forensic-analysis-of-email","tag-paypal-phishing-email","tag-phishing-email","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Different Signs for Detecting a Phishing Email - Complete Guide<\/title>\n<meta name=\"description\" content=\"A comprehensive guide for detecting phishing emails through common red flags (with real examples).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Different Signs for Detecting a Phishing Email - Complete Guide\" \/>\n<meta property=\"og:description\" content=\"A comprehensive guide for detecting phishing emails through common red flags (with real examples).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T13:09:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T05:53:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhinav Sethi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhinav Sethi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\"},\"author\":{\"name\":\"Abhinav Sethi\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"headline\":\"How to Spot a Phishing Email?\",\"datePublished\":\"2020-06-15T13:09:06+00:00\",\"dateModified\":\"2024-08-20T05:53:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\"},\"wordCount\":1152,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\",\"keywords\":[\"email forensics\",\"email phishing\",\"email security\",\"email spoofing\",\"forensic analysis of email\",\"paypal phishing email\",\"phishing email\"],\"articleSection\":[\"Email Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\",\"name\":\"Different Signs for Detecting a Phishing Email - Complete Guide\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\",\"datePublished\":\"2020-06-15T13:09:06+00:00\",\"dateModified\":\"2024-08-20T05:53:28+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"description\":\"A comprehensive guide for detecting phishing emails through common red flags (with real examples).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Spot a Phishing Email?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\",\"name\":\"Abhinav Sethi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"caption\":\"Abhinav Sethi\"},\"description\":\"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Different Signs for Detecting a Phishing Email - Complete Guide","description":"A comprehensive guide for detecting phishing emails through common red flags (with real examples).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/","og_locale":"en_US","og_type":"article","og_title":"Different Signs for Detecting a Phishing Email - Complete Guide","og_description":"A comprehensive guide for detecting phishing emails through common red flags (with real examples).","og_url":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2020-06-15T13:09:06+00:00","article_modified_time":"2024-08-20T05:53:28+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg","type":"image\/jpeg"}],"author":"Abhinav Sethi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhinav Sethi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/"},"author":{"name":"Abhinav Sethi","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"headline":"How to Spot a Phishing Email?","datePublished":"2020-06-15T13:09:06+00:00","dateModified":"2024-08-20T05:53:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/"},"wordCount":1152,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg","keywords":["email forensics","email phishing","email security","email spoofing","forensic analysis of email","paypal phishing email","phishing email"],"articleSection":["Email Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/","url":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/","name":"Different Signs for Detecting a Phishing Email - Complete Guide","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg","datePublished":"2020-06-15T13:09:06+00:00","dateModified":"2024-08-20T05:53:28+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"description":"A comprehensive guide for detecting phishing emails through common red flags (with real examples).","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Learn-How-to-Spot-a-Phishing-Email.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/how-to-spot-a-phishing-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Spot a Phishing Email?"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4","name":"Abhinav Sethi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","caption":"Abhinav Sethi"},"description":"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.","sameAs":["https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/58858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=58858"}],"version-history":[{"count":21,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/58858\/revisions"}],"predecessor-version":[{"id":172584,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/58858\/revisions\/172584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/58864"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=58858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=58858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=58858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}