Threats & Attacks

Req 4d — Spoofing & Phishing

4d.
Describe what spoofing and phishing are, and how to recognize a message or website that might be trying to trick you. Explain what steps you should take to protect yourself and others if you come across one.

You get an email from your bank: “We detected suspicious activity on your account. Click here to verify your identity immediately.” The email looks real — it has the bank’s logo, the right colors, even a professional tone. But the link leads to a fake website designed to steal your password. This is phishing, and it is the most common cyberattack in the world.

What Is Spoofing?

Spoofing is pretending to be someone or something you are not. It is the umbrella technique behind many cyberattacks. Attackers “spoof” trusted identities to trick you into lowering your guard.

Common types of spoofing:

What Is Phishing?

Phishing is a specific attack that uses spoofing to trick you into giving up sensitive information — passwords, credit card numbers, Social Security numbers, or login credentials. The name comes from “fishing” — the attacker casts bait and waits for someone to bite.

Types of Phishing

How to Spot a Phishing Attempt

Phishing messages are getting more sophisticated every year, but they still leave clues.

Phishing Red Flags

Check for these warning signs in any suspicious message
  • Urgency and threats: “Your account will be suspended in 24 hours” or “Act now or lose access.” Legitimate companies rarely threaten you via email.
  • Generic greetings: “Dear Customer” or “Dear User” instead of your actual name.
  • Suspicious sender address: The display name might say “Apple Support” but the actual email is something like support@apple-verify-id.com. Check the full email address.
  • Misspellings and bad grammar: Professional companies proofread their emails. Multiple errors are a red flag.
  • Unexpected attachments: Do not open attachments you did not expect, especially .exe, .zip, or .doc files.
  • Mismatched links: Hover over a link (without clicking) to see where it actually goes. If the display text says “www.paypal.com” but the URL goes somewhere else, it is a phish.
  • Requests for sensitive information: Legitimate companies will never ask for your password, full Social Security number, or credit card number via email.

Recognizing Fake Websites

Phishing emails often lead to fake websites that look nearly identical to the real thing. Here is how to spot them:

Be Internet Alert — Google Interactive resources from Google for recognizing phishing, scams, and other online deceptions.