The majority of spoofing campaigns attempt to extract personal information or install malware by using common household names, known executives, or friendly vendors. This familiarity encourages recipients to click a link in the email or download an attachment.
If you know how to recognize a spoofed email, you know not to fall for their tricks.
For example, one of the most common types of spoofing campaigns involves PayPal. The spoofed email will claim that the receiver’s account has been suspended, and they need to click on the link in the email to resolve the issue. The email looks official, almost exactly like an email from PayPal would.
But when the user clicks the link, their PayPal username and password will be stolen through the fake domain. When this PayPal account is associated with a business, these consequences are even more dire.
Other examples of popular phishing campaigns include:
Credit Card Confirmation: This type of campaign sends messages to thousands of consumers claiming that their credit card information may have been compromised. These emails include a link for the user to “confirm” their credit card details.
Wire Transfer Request: The victim receives an urgent email from the CEO or other executive requesting a wire transfer to a known partner. Due to the urgency of the email, the victim transfers the funds to the partner, not realizing that they’ve fallen victim to spoofing.
Tech Support Request: An employee receives an email from their corporate IT department asking them to install a piece of software. The email looks real, but when the employee acts, they’re injecting ransomware directly into the company network
While many spoofing campaigns may seem amateurish, these exact scenarios have caused billions of dollars in losses for individuals and businesses worldwide.