Tips and tricks from my line of work on how to identify phishing emails.

![]() |
Part of my job at work is investigating and responding to phishing emails within the organization. So here's a few tips and tricks to help identify them and stay safe. *Email was made for educational purposes. First thing first, you see a notification like this and you start to freak out Upon clicking the notification you see this email: The Most Effective Phishing Emails are the ones that create a sense of urgencyAttackers pray on your emotions, you see this email and start to freak out and click the link without even thinking. Step 1.) Remain Calm, before you do anything actually analyze the email. Step 2.) Check the sender, in the notification and the email above the name is 'Coinbase', attackers will also try to mimic emails similar to the legitimate one in this case its The sender may also be spoofed and look like it came from a legitimate sender, for that we can check the headers, which I will cover later. Step 3.) Language, often times phishing emails are rushed and loaded with spelling errors, in this email you can see account is spelled wrong, along with a missing apostrophe in didn't. And as stated they will try to rush you with a sense of urgency so look out for keywords such as 'urgent' / 'immediately' Step 4.) Links, generally i'd advise never clicking links in emails and just visiting the site through a bookmark you set or typing is in the address bar (searching through a search engine can have ads that lead to malicious sites above the legitimate one) For this you can hover your mouse over the link to see the link is actually to reddit and not Coinbase Support, but this could of lead to a phishing site where you enter your credentials to Coinbase, and if you don't have 2FA activated they now have the ability to login. You can also right click and hit 'Copy Link Address' and use a tool such as https://urlscan.io/ to scan URLs to see where it goes (make sure to change it to private search incase it contains personal info) or check the url against site such as https://transparencyreport.google.com/safe-browsing/search, http://phishtank.org/index.php, or https://www.virustotal.com/gui/ to see if its known. Headers: First, to find out how to get the headers for your mail service: https://mxtoolbox.com/Public/Content/EmailHeaders/ after getting the headers for the email you can paste it in the analyze headers section (For analyzing headers I use: https://mxtoolbox.com/EmailHeaders.aspx) What I generally look at is:
which should all line up with the the legitimate sender / company. Quick Protections:
submitted by /u/xCryptoPandax |