Table of Contents
Email Scam Definition
Email is one of the most beneficial ways to communicate with anyone. But it is also a primary tool used by attackers to steal money, account credentials, and sensitive information.
Types of email scams come in many forms including:
If users interact with the email scammer and provide sensitive information, it can cause long-term issues for your organisation, including identity theft, financial loss and data corruption.
Cybersecurity Education and Training Begins Here
Here’s how your free trial works:
- Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure
- Within 24 hours and minimal configuration, we'll deploy our solutions for 30 days
- Experience our technology in action!
- Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks
Fill out this form to request a meeting with our cybersecurity experts.
Thank you for your submission.
But a growing number of email scams don’t exhibit any of the typical behaviours. They don’t include attachments or URLs. And they hide in plain sight by disguising themselves as normal everyday business.
These attacks are sometimes called business email compromise (BEC) or email account compromise (EAC). They usually start when the attacker impersonates someone the recipient trusts—perhaps a boss, colleague or business partner—and asks for something that seems like a normal business request. It might be making a wire transfer or changing payment details, things that take place all the time in the regular course of business. By the time the organisation senses something is off, the email scammer already has the money.
What to Do After Responding to a Phishing Email
Email Scam Examples
Attackers have dozens of common strategies. If you have a free email solution such as Gmail and use your email address on contact forms across the internet, you probably have scam emails in your spam inbox.
Attackers might cast a wide net by sending email scams by the thousands. In this model, the more emails sent, the better chance of tricking numerous targeted users.
Other attackers might take a more targeted approach, carefully choosing a recipient with the right access to data, systems or resources. The attacker researches the victim online and tailors the emails to be as personal and convincing as possible. In some cases, the attacker has already compromised a legitimate email account and has access to previous email conversations, calendars and contacts—ammunition for highly convincing impersonations.
Here’s an example of an email scam:
The above image is a message (sent to Gmail’s spam inbox) that an attacker sent, using FedEx to trick a targeted user into sending private data. Attackers use this type of message because someone is always waiting on a FedEx package. If the message is sent to thousands of recipients, it can trick many of them.
Email spoofing is common in scams, but the sender’s email address in the above image is from a public domain unassociated with FedEx. The email gives no contact number but has a single link that points to a malicious web page.
Another giveaway in this email scam example is that the email does not address the recipient by name or have any personal information that an account vendor would have. The email is generic with only the recipient’s email address used in the greeting (the email address is blacked out).
Here are a few common factors in most email scams:
- Use of a trusted common business (such as FedEx, Netflix, PayPal, your bank, and so on).
- Conveys urgency such as losing an account or product if the targeted user does not respond.
- Includes a generic greeting that does not use a name.
- Includes a convenient button for the targeted user to click and access the malicious site.
- Uses an email address not associated with the official business but deceptively similar to it. For instance, the sender could use the fedexx.com domain trick users, most of whom don’t bother looking at the return address.
- Deploy an email defence that customises controls based on each users’ unique vulnerability, attack profile and access privileges. It should detect malicious attachments, unsafe URLs and social engineering techniques.
- Use email domain authentication technology such as DMARC to prevent email fraud schemes from using your trusted domain, including attacks aimed at your users.
- Prevent email and cloud account compromise with technology that reveals suspicious activity and other signs of takeover. Scan internal email, which could come from compromised accounts. Use multifactor authentication (MFA) where possible but keep in mind that it’s not a failsafe solution to account compromise.
- Isolate risky websites and URLs. Web isolation technology can assess suspicious web pages and unverified URLs in a protected container within a users’ normal web browser.
- Train users on the latest phishing tactics and to be on alert for return email addresses that don’t match the sender (including those with domains that are slightly off-brand).
- Always keep your security (antivirus and antimalware) software updated for threats that reach the endpoint.
- Update your operating system when patches and new releases are available. Many of these patches remediate vulnerabilities made public by researchers and cybersecurity experts.
- Back up data frequently in case you accidentally fall victim. Your backups can be used as data recovery. Consider using cloud backup storage for the best protection. But remember that many of the costliest email scams don’t use malware at all.