<< Prev. Page: Verify Sender & Inspect Messages
Manipulate Sender Identity To Fool Recipients
Check the sender's complete email address instead of just relying on the sender's name, as it can be easily spoofed. The public email providers allow creating an email with any profile or make changes to it. Cyber-criminals exploit this and create the email id's in the name of celebrities or high profile people. They are free to add any information like name, birthday, gender, and phone.
Most businesses use email addresses created on official domain names, which represent their legitimacy and authenticity. But scammers can use the rouge servers, which allows them to fake senders addresses. Be vigilant and click on the drop-down arrow below the sender's email address and check the details like mailed-by and signed-by with the official domain, followed by encryption.
The hackers exploit this and create email addresses using social engineering. In the message body, they hide their malicious links behind legitimate-looking words or hyperlink images or hide it behind a button. If you find any email suspicious, check its headers information. It will provide you information like the original sender's IP, and time-taken to reach, transit points, SPF (Sender's Policy Framework) and DKIM (Domain Key Identification Message).
Report phishing or spoofed emails, as it helps organizations to curb illegal activities. Furthermore, protect other users from getting these emails. The user's timely reporting allows companies to take action against the attackers and stops malicious phishing emails. Almost every company takes phishing and spoofing attempts very seriously.