Phishing: 03. Email Phishing

  • Home
  • Phishing: 03. Email Phishing
Email phishing illustration featuring a deceptive email with a hacker icon, warning symbol, and security breach indicators, emphasizing cybersecurity training by Safety Is A Mindset.
Email Phishing — Phishing Series 03 | Safety Is A Mindset
Safety Is A
Mindset
Phishing Series · Issue 03
Phishing Series

Email Phishing The Inbox
Is a Battlefield.

Every day, 3.4 billion phishing emails are sent worldwide. They arrive looking like your bank, your CEO, your IT department. At Safety Is A Mindset, we teach people to read emails differently — to see the trap before they click the link.

Threat Intelligence

Anatomy of a Phishing Email

Real phishing emails are crafted by professionals. They study your company, copy real brand assets, and exploit psychology. Below is a simulated example with annotations — hover the highlighted areas to reveal the attack tactics.

Tactic 01 — Spoofed Domain

The Domain Looks Familiar

Attackers register domains nearly identical to real ones — adding "helpdesk", "support", or changing .com to .net. Always verify the full email address, not just the display name.

Tactic 02 — Urgency Engineering

24-Hour Countdown

Manufactured urgency overrides critical thinking. "Suspended in 24 hours" is a known psychological trigger. A safety mindset recognizes urgency as a red flag — not a reason to hurry.

Tactic 03 — Generic Salutation

"Valued Employee"

Bulk phishing campaigns can't personalize. "Dear Valued Employee" signals a mass attack. Spear phishing — targeted attacks — may use your real name, making verification even more critical.

Tactic 04 — Reporting Suppression

"Do Not Contact IT"

Attackers know reporting kills the attack. They embed instructions to not call IT. This is always suspicious. Safety Is A Mindset training builds the reflex: when in doubt, report it.

Recognition Training

8 Red Flags in Every Phishing Email

Phishing emails share tell-tale patterns. Training your brain to spot them is exactly what Safety Is A Mindset's cybersecurity awareness programs do — turning recognition into reflex.

Mismatched or Suspicious Sender Address

The display name says "Microsoft Support" but the actual email is from a random domain. Always expand and read the full email address — never just the name shown in your inbox.

Artificial Urgency or Threats

"Your account will be closed in 12 hours." Real organizations don't threaten you into clicking links. Time pressure is designed to bypass your judgment — recognize it for what it is.

Suspicious Links That Don't Match

Hover over any link before clicking. The URL that appears in your status bar should match where the link claims to go. Mismatches, typosquatted domains, and shortened URLs are immediate red flags.

Unexpected Attachments

An invoice you didn't expect. A document from someone you don't recognize. Attackers embed malware in PDFs, Word files, and Excel sheets. Never open attachments without verifying the sender through a separate channel.

Generic or Impersonal Greeting

"Dear Customer," "Dear User," "Valued Employee" — your bank knows your name. Your employer knows your name. Mass phishing campaigns often can't personalize at scale. Generic greetings are a signal.

Poor Grammar and Odd Phrasing

Though AI is improving attacker writing quality, many phishing emails still contain spelling mistakes, awkward phrasing, or overly formal language. These are residual signals of non-native authorship or automated generation.

Requests for Credentials or Sensitive Data

Legitimate organizations never ask for passwords, PINs, or full account details via email. Ever. No exceptions. Any email requesting this information should be treated as hostile — regardless of how official it looks.

Impersonation of Known Brands or Colleagues

Logos, signatures, and formatting can be copied in minutes. An email that looks exactly like it's from your CEO or your bank may not be. Always verify unexpected requests — especially those involving money, data, or access — through a known phone number or in person.

Attack Taxonomy

Types of Email Phishing Attacks

Not all phishing emails are equal. Understanding the different attack types helps Safety Is A Mindset training programs build targeted awareness for every role in your organization.

High Risk

Spear Phishing

Targeted attack on a specific individual. Attackers research the victim first — name, role, colleagues, recent projects — and craft a convincing, personalized email. Significantly harder to detect.

Targeted · High Effort

Executive Threat

Whaling

Spear phishing aimed at senior executives — CEOs, CFOs, board members. Often involves requests for wire transfers, sensitive data, or confidential documents. Poses as legal counsel, regulators, or business partners.

C-Suite Focus · Critical

Internal Threat

Business Email Compromise

Attacker impersonates a trusted internal party — a manager, executive, or vendor — to authorize fraudulent transactions or data transfers. Often indistinguishable from legitimate internal email at first glance.

Financial Risk · BEC

Credential Attack

Clone Phishing

A legitimate email previously received is cloned — same content, same layout — but with links or attachments replaced with malicious versions. Sent from a spoofed address, claiming to be a "resend" or "updated version."

Deceptive · Trusted Look

When It Happens

What To Do If You Receive — or Click — a Phishing Email

Immediate — Before Anything Else

Do Not Click, Download, or Reply

If you've spotted a suspicious email and haven't acted yet — stop. Do not click links, download attachments, or reply to the sender. The safest action is no action. Close the email without interacting with any element inside it.

Within 1 Minute

Report It — Don't Delete It

Use your organization's phishing report button, forward it to your security team's designated inbox, or follow your company's reporting procedure. Do not delete it — your IT team needs the original email headers to investigate the source and protect others.

If You Clicked a Link — Immediately

Disconnect from the Network

If you clicked a link or opened an attachment, disconnect from Wi-Fi or unplug your ethernet cable immediately. This limits the attacker's ability to communicate with malware or exfiltrate data. Do not turn off the machine — your IT team may need to examine its state.

Within 5 Minutes

Contact IT Security Immediately

Call — don't email — your IT security team. Explain exactly what happened: what email arrived, what you clicked or downloaded, and when. Speed of notification is the single most important factor in limiting the damage from a phishing click.

If Credentials Were Entered

Change Passwords from a Safe Device

If you entered a password on a phishing page, change it immediately from a different, uncompromised device. Notify your IT team of every system you use that password for. Enable multi-factor authentication if not already active. Credential theft can cascade across systems within minutes.

Always — No Exceptions

Never Stay Silent Out of Embarrassment

A safety mindset means no blame culture. The most dangerous response to clicking a phishing link is silence. Organizations that create psychological safety — where people report mistakes without fear — detect and contain breaches far faster than those that don't. Your report protects your colleagues.

Common Questions

Even a perfectly crafted phishing email leaves traces. Check the full sender email address — not just the display name. Hover over every link before clicking and compare the URL in the status bar to where the link claims to go. Look for slight domain variations: paypa1.com vs paypal.com, amaz0n.com vs amazon.com. When an email requests urgent action involving money, credentials, or sensitive data, always verify the request through a completely separate channel — call the person directly using a number you already have. At Safety Is A Mindset, we teach: if an email creates urgency, slow down. That urgency is engineered.
Generally, opening a phishing email in a modern email client without clicking links or downloading attachments poses very low risk. However, some sophisticated attacks exploit email rendering vulnerabilities — particularly in older email clients — through tracking pixels or HTML that execute on open. The safest rule is: if you've identified an email as suspicious, forward it to your security team before doing anything else, and close it. Don't open attachments even "just to see what's inside." Don't click unsubscribe links. Don't load images. Treat suspicious emails as potentially hot — minimal contact until your IT team confirms it's safe.
Modern phishing attacks are specifically engineered to evade automated detection. Attackers use newly registered domains with no reputation history, send emails from legitimate-seeming infrastructure, or compromise real email accounts to send attacks from trusted addresses. They vary language and formatting to avoid signature-based filters. Some use legitimate services — SharePoint, Google Drive, Dropbox — to host malicious content, making the link itself appear genuine. This is precisely why the human layer of defense is irreplaceable. No filter catches everything. A trained eye is your last line of defense — and at Safety Is A Mindset, we train that eye to be very good.
Business Email Compromise (BEC) is one of the most financially devastating phishing variants. The attacker impersonates a trusted authority — your CEO, a vendor, or a client — and requests urgent wire transfers, gift card purchases, or sensitive data. What makes BEC different is that it often involves no malicious links or attachments. It's entirely social engineering delivered through email tone and authority. Red flags include: unexpected wire transfer requests, requests to change payment details for a known vendor, any financial request accompanied by strong urgency, and instructions to keep the request confidential. Always verify financial requests out-of-band — call the supposed sender using a number you independently look up. Never use contact details provided in the suspicious email itself.
Not necessarily. Visiting a malicious URL can expose your device to drive-by download attacks — where malware is installed simply by loading the page, without any further user interaction. The page may also collect your browser fingerprint, IP address, and session data. Even without entering credentials, your visit confirms your email address is active (valuable to attackers) and may trigger follow-up attacks. The correct response is still to disconnect from the network immediately, notify IT security, and have your device scanned. Never conclude you're safe just because you didn't type anything — report it regardless. Early reporting is always the right response.
Most phishing training tells people what to look for and tests them once a year. Safety Is A Mindset builds behavioral habits — the kind that activate under pressure, when you're busy, when you're tired, when the email looks completely legitimate. We use the same principles that transformed physical workplace safety: make the safe behavior the easiest behavior, create psychological safety for reporting mistakes without blame, embed training into regular workflow rather than treating it as an annual event, and measure behavior change — not just quiz scores. Our phishing simulations are designed to build the instinct to pause, verify, and report. That instinct is what saves organizations — not the poster on the break room wall.
No — this is a common and well-intentioned mistake that can amplify the attack. Forwarding a phishing email distributes the malicious link or attachment to more people, increasing the attack surface and potentially triggering the same victim response in your colleagues. It can also alter the email headers that your IT team needs for investigation. The correct approach is to report the email to your security team through your organization's designated channel (a reporting button, a dedicated inbox, or a direct call) and let them notify the organization if needed. They have tools to safely analyze and distribute warnings without propagating the attack itself.

Duration: 7 minutes

Format: Video

Tier: 2

Course ID: 7521

Languages: English

Get Started with Safety Is A Mindset Training

Complete the form below to request more information, schedule your training, or ask questions about any of our professional safety programs. Let us help you take the next step toward a safer and more compliant workplace.