{"id":192,"date":"2022-12-01T06:10:50","date_gmt":"2022-12-01T06:10:50","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=192"},"modified":"2023-04-14T18:20:22","modified_gmt":"2023-04-14T10:20:22","slug":"8-examples-of-common-phishing-emails","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/","title":{"rendered":"8 Examples of Common Phishing Emails"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > 8 Examples of Common Phishing Emails<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-bm2th3z \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-bm2th3z button-1\" data-id=\"eb-advance-heading-bm2th3z\"><h2 class=\"eb-ah-title\">8 Examples of Common Phishing Emails<\/h2><p class=\"eb-ah-subtitle\">December 1, 2022<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-1024x538.jpg\" alt=\"\" class=\"wp-image-193\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Phishing comes from the word <em>fishing<\/em>: the hacker lures users with a \u201cbait\u201d (legitimate-looking email, text message or website), hoping that users will \u201cbite\u201d by providing their sensitive information such as username, password and bank information, or by downloading malicious software that infects the user\u2019s computer.<\/p>\n\n\n\n<p>Here are 8 examples of common phishing emails for your reference so that you can identify and avoid them when you receive one.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"root-eb-toc-rvwj6ms wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-rvwj6ms \"><div class=\"eb-toc-container eb-toc-rvwj6ms  eb-toc-is-not-sticky eb-toc-collapsible eb-toc-initially-not-collapsed eb-toc-scrollToTop style-1 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"false\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;8 Examples of Common Phishing Emails&quot;,&quot;text&quot;:&quot;8 Examples of Common Phishing Emails&quot;,&quot;link&quot;:&quot;8-examples-of-common-phishing-emails&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Account Suspension Mail&quot;,&quot;text&quot;:&quot;Account Suspension Mail&quot;,&quot;link&quot;:&quot;account-suspension-mail&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Password Expiration Notice&quot;,&quot;text&quot;:&quot;Password Expiration Notice&quot;,&quot;link&quot;:&quot;password-expiration-notice&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Fake Mailbox Full Notice&quot;,&quot;text&quot;:&quot;Fake Mailbox Full Notice&quot;,&quot;link&quot;:&quot;fake-mailbox-full-notice&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Bank Scam Email&quot;,&quot;text&quot;:&quot;Bank Scam Email&quot;,&quot;link&quot;:&quot;bank-scam-email&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;WeTransfer Phishing Mail&quot;,&quot;text&quot;:&quot;WeTransfer Phishing Mail&quot;,&quot;link&quot;:&quot;wetransfer-phishing-mail&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Unusual Activity Notice&quot;,&quot;text&quot;:&quot;Unusual Activity Notice&quot;,&quot;link&quot;:&quot;unusual-activity-notice&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Quotation Request Scam&quot;,&quot;text&quot;:&quot;Quotation Request Scam&quot;,&quot;link&quot;:&quot;quotation-request-scam&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Human Resource (HR) Email Scam&quot;,&quot;text&quot;:&quot;Human Resource (HR) Email Scam&quot;,&quot;link&quot;:&quot;human-resource-hr-email-scam&quot;}]\" data-visible=\"[true,true,false,false,false,false]\" data-delete-headers=\"[{&quot;label&quot;:&quot;8 Examples of Common Phishing Emails&quot;,&quot;value&quot;:&quot;8-examples-of-common-phishing-emails&quot;,&quot;isDelete&quot;:true},{&quot;label&quot;:&quot;Account Suspension Mail&quot;,&quot;value&quot;:&quot;account-suspension-mail&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Password Expiration Notice&quot;,&quot;value&quot;:&quot;password-expiration-notice&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Fake Mailbox Full Notice&quot;,&quot;value&quot;:&quot;fake-mailbox-full-notice&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Bank Scam Email&quot;,&quot;value&quot;:&quot;bank-scam-email&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;WeTransfer Phishing Mail&quot;,&quot;value&quot;:&quot;wetransfer-phishing-mail&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Unusual Activity Notice&quot;,&quot;value&quot;:&quot;unusual-activity-notice&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Quotation Request Scam&quot;,&quot;value&quot;:&quot;quotation-request-scam&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Human Resource (HR) Email Scam&quot;,&quot;value&quot;:&quot;human-resource-hr-email-scam&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#account-suspension-mail\">Account Suspension Mail<\/a><li><a href=\"#password-expiration-notice\">Password Expiration Notice<\/a><li><a href=\"#fake-mailbox-full-notice\">Fake Mailbox Full Notice<\/a><li><a href=\"#bank-scam-email\">Bank Scam Email<\/a><li><a href=\"#wetransfer-phishing-mail\">WeTransfer Phishing Mail<\/a><li><a href=\"#unusual-activity-notice\">Unusual Activity Notice<\/a><li><a href=\"#quotation-request-scam\">Quotation Request Scam<\/a><li><a href=\"#human-resource-hr-email-scam\">Human Resource (HR) Email Scam<\/a><\/ul><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>Account Suspension Mail<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-k80jtza \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-k80jtza img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-k80jtza\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-account_suspension_scam.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Account suspension email is one of the most popular phishing templates that scammers use these days. They pretend to be from your service provider or IT administrator, and claim that your account will be suspended unless you click a link to reactivate your account. They ask for your personal information like username and password. The link also often contains virus that could infect your computer.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Take note on the sender\u2019s actual email address. Scammers may use your domain in their name to appear legitimate, but the email address may be from an external domain.<\/li>\n\n\n\n<li>Look for forceful wording like \u201cFinal Warning\u201d and \u201cFinal Notice\u201d in the subject line, which is a common scare tactic used by most phishing scams.<\/li>\n\n\n\n<li>Hover over the link in the email without clicking it. If it does not match the context, it is most probably a malicious link. Beware of slight alterations to URLs, for example, https:\/\/legitimatesite.com might appear as http:\/\/legitmatesite.com.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Password Expiration Notice<\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-fexi6s5 \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-fexi6s5 img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-fexi6s5\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-password_expiration_scam-1.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Similar to the sample above, this type of phishing email claims that your password has expired. You will be asked to click the link inside the email, which will direct you to a seemingly legitimate webpage to update your password. However, any credentials entered into this page will fall straight into the hands of the hacker, who will then use your account to perform illegal activities (like sending spams, delivering malware, stealing your email data, etc).<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check who send the email. If the sender is unknown or suspicious-looking, it is a scam.<\/li>\n\n\n\n<li>Look for grammar mistakes or abnormal sentences. For example, \u201cAction required Fix this below\u201d in one sentence does not make sense.<\/li>\n\n\n\n<li>Check the URL before clicking it. Never click the link if it is pointing to an unknown website.<\/li>\n\n\n\n<li>Beware of sender who requests for your password.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Fake Mailbox Full Notice<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-piggipi \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-piggipi img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-piggipi\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-mailbox_full_scam.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Another example of phishing email is the fake mailbox full notification email. This type of scam mail urges you to click a button or link to reduce your mailbox size automatically. If you click the button or link, a malware will be downloaded, infecting your computer.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check if the sender email address is related to your domain or email service provider. If you do not recognize the sender email address, you should be aware of the email.<\/li>\n\n\n\n<li>Hover over the link to check the target URL. If it is pointing to a website that has nothing to do with your website (or your email service provider&#8217;s website), discard the email immediately.<\/li>\n\n\n\n<li>Email provider usually does not request user to clear storage space by clicking a URL link within an email. All email space adjustment should be configured by the administrator through official admin portal.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong><strong>Bank Scam Email<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-0cskzkp \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-0cskzkp img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-0cskzkp\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-bank_scam.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>People tend to be more attentive towards emails sending from banks. Hackers take advantage of this by impersonating your bank, sending you fraudulent emails related to bank transactions and withdrawals. Their goal is to obtain your sensitive information like account information and password, which they can use to steal your funds or perform unauthorized transactions.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Make sure the sender email address does come from your bank\u2019s official domain. Take note on any extra or missing character in the email address. You should verify with the bank\u2019s customer service if you are unsure of the email.<\/li>\n\n\n\n<li>Look for grammar mistakes in the email message. If it contains spelling errors or unusual language, it is most likely a scam mail, because legitimate companies never risk making a bad impression with poor grammar.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong>WeTransfer Phishing Mail<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-p8de4mt \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-p8de4mt img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-p8de4mt\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-wetransfer_scam.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>WeTransfer is one of the popular cloud-based online platforms for file transferring. Due to its popularity, cybercriminals would take the opportunity to deceive you through this medium. The WeTransfer phishing mail looks very similar to the normal WeTransfer email, as if someone has sent you a file through WeTransfer, where you need to click a link to get the file. Many times, the link contains malware, and when it is clicked, you will be asked for your personal information.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Look out for suspicious download URL. Hover over the button or link to view the actual URL. Any URL that is not part of https:\/\/wetransfer.com should be considered dangerous.<\/li>\n\n\n\n<li>Look at the sender \u2013 \u201cWeTransfer\u201d may be presented as the sender\u2019s name, but the email address may be from an unknown source.<\/li>\n\n\n\n<li>If you do not expect any file transfer from anyone, you can simply ignore the email as it is probably a phishing attempt. Even if you are expecting a file transfer via WeTransfer, do confirm the file name and size with the sender before interacting with the email.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong>Unusual Activity Notice<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-unzj6uk \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-unzj6uk img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-unzj6uk\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-usual_signin-1.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>People are most likely alerted when they receive information related to the security of their account. Knowing this, cybercriminals forge emails about security breach, with fake sign-in details such as IP address, country, date and\/or web browser and send to users. Users are usually asked to secure their account by clicking a link or button present in the email. If you click the link or button, you will be navigated to a fake website that asks for your information (like username and password). If you provide these information, the hacker will gain access to your account.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check the sender address. If the email address looks legitimate, check for any extra or missing characters in the sender email or domain.<\/li>\n\n\n\n<li>Spot for any urgency and threatening tone, such as \u201cIf you do not take action in 24 hours, your account will be suspended\u201d.<\/li>\n\n\n\n<li>Check the URL of the button before clicking it. If the URL is linking to a suspicious-looking website, it is a scam.<\/li>\n\n\n\n<li>Never provide your password to any email sender who asks for it.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong>Quotation Request Scam<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-y5yg420 \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-y5yg420 img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-y5yg420\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-quotation_scam-1.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In this kind of scam, the fraudster requests to order products from your company and asks for a quote by attaching a purchase order. The attached file is usually in PDF, Document, compressed or unknown file format, which contains malicious code that could corrupt your computer if it is downloaded.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Never respond to or download any attachment from emails that are sent from unknown senders.<\/li>\n\n\n\n<li>If the attachment is in unusual format or is compressed (in .zip, .rar, etc), do not download it.<\/li>\n\n\n\n<li>Look for vague content in the message, such as \u201cwe are in urgent need to order your products\u201d \u2013 any legitimate customer should include the actual product or service name or details when asking for quotation.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong>Human Resource (HR) Email Scam<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-ecebecb \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-ecebecb img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-ecebecb\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-hr_scam.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In such scam, the hacker disguises as your Human Resource (HR) department that sends you a link to check about HR-related matters like leave approvals. Clicking the link leads you to a phishing website that requests you to sign in \u2013 which is the hacker\u2019s purpose \u2013 to steal your username and password.<\/p>\n\n\n\n<p class=\"has-neve-link-color-color has-text-color\"><strong>How to detect:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Emails that are sent from your HR department should come from your own domain. Any HR-related email that comes from an external domain is most probably a scam mail.<\/li>\n\n\n\n<li>Double-check with your HR department if the email was really sent from them.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>If you detect any suspicious email, it is best to remove it immediately from your mailbox. Never respond to it till you are 100% sure about its authenticity. If you need help identifying an email, you can always reach out to your email service provider for verification.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.<\/p>\n","protected":false},"author":1,"featured_media":193,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 Examples of Common Phishing Emails<\/title>\n<meta name=\"description\" content=\"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Examples of Common Phishing Emails\" \/>\n<meta property=\"og:description\" content=\"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T06:10:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-14T10:20:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"8 Examples of Common Phishing Emails\",\"datePublished\":\"2022-12-01T06:10:50+00:00\",\"dateModified\":\"2023-04-14T10:20:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\"},\"wordCount\":1361,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\",\"url\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\",\"name\":\"8 Examples of Common Phishing Emails\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg\",\"datePublished\":\"2022-12-01T06:10:50+00:00\",\"dateModified\":\"2023-04-14T10:20:22+00:00\",\"description\":\"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg\",\"width\":1200,\"height\":630,\"caption\":\"8 Examples of Common Phishing Emails\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Examples of Common Phishing Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Examples of Common Phishing Emails","description":"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"8 Examples of Common Phishing Emails","og_description":"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.","og_url":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2022-12-01T06:10:50+00:00","article_modified_time":"2023-04-14T10:20:22+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"8 Examples of Common Phishing Emails","datePublished":"2022-12-01T06:10:50+00:00","dateModified":"2023-04-14T10:20:22+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/"},"wordCount":1361,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/","url":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/","name":"8 Examples of Common Phishing Emails","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg","datePublished":"2022-12-01T06:10:50+00:00","dateModified":"2023-04-14T10:20:22+00:00","description":"More than 90% of cyber attacks start with a phishing mail. Here are 8 examples of common phishing emails that your should look out and avoid.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2022\/12\/8-Examples-of-Common-Phishing-Emails.jpg","width":1200,"height":630,"caption":"8 Examples of Common Phishing Emails"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/8-examples-of-common-phishing-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 Examples of Common Phishing Emails"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":15,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"predecessor-version":[{"id":487,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/192\/revisions\/487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/193"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}