{"id":24453,"date":"2025-07-29T17:50:31","date_gmt":"2025-07-29T13:50:31","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24453"},"modified":"2025-07-29T17:50:31","modified_gmt":"2025-07-29T13:50:31","slug":"how-to-deal-with-email-phishing","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/24453\/","title":{"rendered":"Phishing 101: what to do if you get a phishing email"},"content":{"rendered":"<p>Phishing emails typically end up in the spam folder, because today\u2019s security systems easily recognize most of them; however, these systems aren\u2019t completely reliable, so some bona fide email messages land in the junk folder too. This article explains how to detect phishing emails, and what to do about them.<\/p>\n<h2>Signs of phishing email<\/h2>\n<p>There are several markers that are widely believed to indicate a message sent by scammers. Below are some examples.<\/p>\n<ul>\n<li><strong>Catchy subject line. <\/strong>A phishing message will likely represent a fraction of all the mail landing in your inbox. This is why scammers usually try to make their subject lines stand out by using trigger words like \u201curgent\u201d, \u201cprize\u201d, \u201ccash\u201d, \u201cgiveaway\u201d, or similar, designed to prompt you to open the message as quickly as possible.<\/li>\n<li><strong>Call to action. <\/strong>You can bet the message will encourage you to do at least one of the following: click a link, pay for something you don\u2019t really need, or check the details in an attachment. The attackers\u2019 primary goal is to lure victims away from their email and into unsafe spaces where they\u2019re tricked into spending money or surrendering access to their accounts.<\/li>\n<li><strong>Expiring timer. <\/strong>The message might feature a timer that says, <em>\u201cFollow this link. It expires in 24 hours.\u201d<\/em> All these tricks are just nonsense. Scammers want to rush you so you start to panic and stop thinking carefully about your money.<\/li>\n<li><strong>Mistakes in the email body. <\/strong>In the past year, there\u2019s been an increase in phishing emails sent in multiple languages at once, often with some odd mistakes.<\/li>\n<li><strong>Suspicious sender address. <\/strong>If you live in, say, Brazil, and you get an email message from an Italian address, that\u2019s a red flag and a good reason to completely ignore its contents.<\/li>\n<\/ul>\n<p>An impersonal greeting like \u201cDear %username%\u201d used to be a sure sign of a phishing email, but scammers have moved on from that. Targeted messages addressing the victim by name are becoming increasingly common. Ignore those too.<\/p>\n<h2>What to do if you get a phishing email<\/h2>\n<p>If you\u2019ve managed to spot one using the signs described above, well done\u00a0\u2014 you\u2019re awesome! You can go ahead and delete it without even opening. And if you want to do your good deed for the day, report the phishing attempt via <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/how-do-i-report-phishing-or-junk-email-e8d1134d-bb16-4361-8264-7f44c853dc6b\" target=\"_blank\" rel=\"nofollow noopener\">Outlook<\/a> or <a href=\"https:\/\/safebrowsing.google.com\/safebrowsing\/report_phish\/?hl=en\" target=\"_blank\" rel=\"nofollow noopener\">Gmail<\/a> to make this world a tiny bit safer. We understand that spotting phishing in your email right away isn\u2019t easy \u2014 so here\u2019s a short list of don\u2019ts to help with detection.<\/p>\n<h3>Don\u2019t open attachments<\/h3>\n<p>Scammers can hide malware inside various types of email attachments: images, HTML files, and even voice messages. Here\u2019s a recent example: you get an email with an attachment that appears to be a voice message with the SVG extension, but that\u2019s typically an image format\u2026 To listen to the recording, you have to open the attachment, and what do you know\u00a0\u2014 you find yourself on a phishing site that masquerades as <a href=\"https:\/\/voice.google.com\/u\/0\/about\" target=\"_blank\" rel=\"nofollow noopener\">Google Voice<\/a>! And no, you don\u2019t hear any audio. Instead, you\u2019re redirected to another website where you\u2019ll be prompted to enter the login and password for your email account. If you\u2019re interested in learning more, here\u2019s a <a href=\"https:\/\/securelist.com\/svg-phishing\/116256\/\" target=\"_blank\" rel=\"noopener\">Securelist blog post<\/a> on this.<\/p>\n<div id=\"attachment_53995\" style=\"width: 733px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173828\/how-to-deal-with-email-phishing-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53995\" class=\"size-full wp-image-53995\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173828\/how-to-deal-with-email-phishing-01.jpg\" alt=\"It seems that voice messages are sent more often through messengers than by email\" width=\"723\" height=\"314\"><\/a><p id=\"caption-attachment-53995\" class=\"wp-caption-text\">It seems that voice messages are sent more often through messengers than by email<\/p><\/div>\n<p>This and other stories just go to show you shouldn\u2019t open attachments. Any attachments. At all. Especially if you weren\u2019t expecting the message in the first place.<\/p>\n<h3>Don\u2019t open links<\/h3>\n<p>This is a golden rule that will help keep your money and accounts safe. A healthy dose of caution is exactly what everyone needs when using the internet. Let\u2019s take a look at this phishing message.<\/p>\n<div id=\"attachment_53994\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173848\/how-to-deal-with-email-phishing-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53994\" class=\"size-large wp-image-53994\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173848\/how-to-deal-with-email-phishing-02-1024x478.jpg\" alt='An \"exciting win-win\", but only the scammers benefit' width=\"1024\" height=\"478\"><\/a><p id=\"caption-attachment-53994\" class=\"wp-caption-text\">An \u201cexciting win-win\u201d, but only the scammers benefit<\/p><\/div>\n<p>Does this look odd? It\u2019s written in two languages: Russian and Dutch. It shows the return address of a language school in the Netherlands, yet it references the Russian online marketplace Ozon. The message body congratulates the recipient: <em>\u201cYou are one of our few lucky clients who get a chance to compete for uncredible prizes.\u201d<\/em> \u201cCompeting for prizes\u201d is easy: just click the link, which has been thoughtfully included twice.<\/p>\n<p>A week later, another message landed in the same inbox. Again, it came in two languages: Italian and Russian. This one came from a real Italian email address associated with the archive of <a href=\"https:\/\/it.wikipedia.org\/wiki\/Giovanni_Korompay\" target=\"_blank\" rel=\"nofollow noopener\">Giovanni Korompay<\/a>\u2018s works. The artist passed away in 1988. No, this wasn\u2019t an offer to commemorate the painter. Most likely, hackers have breached the archive\u2019s email account and are now sending phishing mail about soccer betting pretending to be from that source. All of that looks a rather fishy.<\/p>\n<div id=\"attachment_53993\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173908\/how-to-deal-with-email-phishing-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53993\" class=\"size-large wp-image-53993\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173908\/how-to-deal-with-email-phishing-03-1024x405.jpg\" alt=\"Another email in two languages\" width=\"1024\" height=\"405\"><\/a><p id=\"caption-attachment-53993\" class=\"wp-caption-text\">Another email in two languages<\/p><\/div>\n<p>These messages have a lot in common. One thing we didn\u2019t mention is how phishing links are disguised. Scammers deliberately use the <a href=\"https:\/\/tinyurl.com\/\" target=\"_blank\" rel=\"nofollow noopener\">TinyURL<\/a> link shortener to make links look as legitimate as possible. But the truth is, a link that starts with <strong>tinyurl.com<\/strong> could point to anything: from the <a href=\"https:\/\/me-en.kaspersky.com\/blog\/subscribe\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Daily blog<\/a>\u00a0to something malicious.<\/p>\n<h3>Don\u2019t believe what\u2019s written down<\/h3>\n<p>Scammers come up with all sorts of tricks: <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-against-spam\/52974\/\" target=\"_blank\" rel=\"noopener nofollow\">pretending to be Nigerian princes<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-premium-scam\/52696\/\" target=\"_blank\" rel=\"noopener nofollow\">sending fake Telegram Premium subscriptions<\/a>, or congratulating people on winning fake giveaways. Every week, I get email with text like this: <em>\u201cCongratulations! You can claim your personal prize.\u201d<\/em> Sometimes they even add the amount of the supposed winnings to make sure I open the message. And once, I did.<\/p>\n<div id=\"attachment_53992\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173929\/how-to-deal-with-email-phishing-04.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53992\" class=\"size-large wp-image-53992\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/29173929\/how-to-deal-with-email-phishing-04-1024x501.jpg\" alt=\"The scammers were too lazy to shorten this link\" width=\"1024\" height=\"501\"><\/a><p id=\"caption-attachment-53992\" class=\"wp-caption-text\">The scammers were too lazy to shorten this link<\/p><\/div>\n<p>Inside, it\u2019s all by the book: a flashy headline, congratulations, and calls to click the link. To make it seem even more convincing, the email is supposedly signed by a representative from the \u201cPrize Board of the Fund\u201d. What fund? What prize board? And how could I possibly have won something I never even entered into? That part is unclear.<\/p>\n<p>You may have noticed the unusual design of this message: it clearly stands out from the previous examples. To add credibility, the scammers used Google Forms, Google\u2019s official service for surveys and polls. The scheme is a simple one: they create a survey, set it up to send response copies to the email addresses of their future victims, and collect their answers. Read <a href=\"https:\/\/www.kaspersky.com\/blog\/google-forms-scam\/53909\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Beware of Google Forms bearing crypto gifts<\/strong><\/a> to find out what happens if you open a link like that.<\/p>\n<h2>The bottom line<\/h2>\n<p>Following these rules will protect you from many \u2014 but not all \u2014 of the tricks that attackers might come up with. That\u2019s why we recommend trusting a reliable solution: <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>. Every year, our products undergo testing by the independent Austrian organization <a href=\"https:\/\/www.av-comparatives.org\/awards\/kaspersky-lab\/\" target=\"_blank\" rel=\"nofollow noopener\">AV-Comparatives<\/a> to evaluate their ability to detect phishing threats. We described the testing procedure in a <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-best-anti-phishing-solution-2024\/51678\/\" target=\"_blank\" rel=\"noopener nofollow\">post<\/a> a year ago. In June 2025, <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium for Windows<\/a>\u00a0successfully met the certification criteria again and received the <strong>Approved<\/strong> certificate, a mark of quality in protecting users from phishing.<\/p>\n<p>Important clarification: at Kaspersky, we use a unified stack of security technologies, which is what the experts tested. This means the <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium for Windows<\/a> award also applies to our other products for home users (<a href=\"https:\/\/me-en.kaspersky.com\/standard?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kstand___\" target=\"_blank\" rel=\"noopener\">Kaspersky Standard<\/a><strong>, <\/strong><a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a>, and <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>) and for businesses (such as <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a>\u00a0and <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a>).<\/p>\n<blockquote><p>More about phishing:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">6 antiphishing tips<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-against-spam\/52974\/\" target=\"_blank\" rel=\"noopener nofollow\">Spam 101: what is spam, and how to defeat it<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/turnkey-phishing\/51614\/\" target=\"_blank\" rel=\"noopener nofollow\">Turnkey phishing<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-redirect-methods\/50045\/\" target=\"_blank\" rel=\"noopener nofollow\">How cybercriminals disguise URLs<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-phishing-on-a-hacked-wordpress-website\/48849\/\" target=\"_blank\" rel=\"noopener nofollow\">How to spot you\u2019re on a hacked website<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t panic. Again, don&#8217;t panic. Did we say don&#8217;t panic? A common threat explained in simple terms.<\/p>\n","protected":false},"author":2754,"featured_media":24459,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,9],"tags":[19,76,321,521],"class_list":{"0":"post-24453","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-email","10":"tag-phishing","11":"tag-technology","12":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/24453\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-deal-with-email-phishing\/29339\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/12651\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-deal-with-email-phishing\/29291\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/28383\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-deal-with-email-phishing\/31248\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-deal-with-email-phishing\/29910\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-deal-with-email-phishing\/40196\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-deal-with-email-phishing\/13643\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/53990\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-deal-with-email-phishing\/23050\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-deal-with-email-phishing\/29501\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-deal-with-email-phishing\/35206\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-deal-with-email-phishing\/34855\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2754"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24453"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24453\/revisions"}],"predecessor-version":[{"id":24460,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24453\/revisions\/24460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24459"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}