SECURE&TIP: FRAUDULENT PHISHING E-MAILS

This entry is also available in:

 

“The cybercriminal has learned to write without faults.

What is “Phishing”?

Phishing is one of the cyber-attack techniques within social engineering, which we talked about in last week’s TIP. The term “Phishing” derives from the English word “fishing” and is always related to the capture of data and information through the use of e-mail to commit this computer crime.

Thus, by means of this technique, the cybercriminal will randomly send to different users, professionals and individuals, false or fraudulent communications by e-mail. In these communications, it is most common to impersonate a trusted contact, whether it is someone close (boss, family member, friend) or an important entity (bank, public administration, insurance company).

It may also be related to fake login verification on platforms (e.g. Amazon, Facebook, Netflix, etc.) or password change requests. This is done so that the User who receives the e-mail does not suspect that it is false and makes a mistake such as downloading a file, clicking on a link, providing data or logging in through a false web page (“Pharming”, we will talk about it in a specific TIP, later on).

This in turn can lead to the camouflaged installation of a virus or malware, i.e. malicious software that damages the computer and information, or to the collection of contacts, passwords and any other data the cybercriminal wants to access.

How can we avoid this?

  • The golden rule remains to be wary of any unusual communication and to “double check”. To find out for sure, we should contact the supposed sender (our boss, relative, bank, etc.) by other official means, to ask if the e-mail received is real.
  • Do not do anything requested until you have checked the above. This means not downloading files or images, not clicking on links and much less entering personal data or passwords on the linked web pages.
  • We can check the links without clicking on them and thus avoid entering data on a fake web page. This can be done by moving the mouse over the link, as we say, without clicking directly. By doing this, you will see that a message will appear with the original name of the website to which the link redirects and you will be able to check if it is an official website or a fraudulent website.
  • If you are suspicious about the content of a communication, do not reply to the e-mail. This could put the cybercriminal on alert and he could use other alternative means to trick us again (such as Vishing, fraudulent phone calls or Smishing, fake text or Whatsapp messages).
  • Do not simply omit or delete it. If we have checked the above and in any of the points we have detected the falsity of the communication, we should not simply eliminate it. We have to notify this incident to the IT support team at work, and at personal level to the technological provider of the e-mail service (Microsoft, Google, etc.), so that they can analyze it, solve it and we can continue using this service with total security, both for us and for any other Users.

IMPORTANT NOTE: Once again, if you have the slightest suspicion of having suffered a cyberattack, inform your IT department so that they can advise you appropriately. And on a personal level, consult the information available on the Internet, ask experts or contact the support teams of the programs and applications.

*Shipment date: November 24, 2025