How to Spot and Identify Phishing Cyber Attacks.

Myra Jarenga
OSINT for all
Published in
3 min readJan 12, 2024

Introduction

In today’s digital age, phishing attacks have become increasingly sophisticated, posing a risk to everyone online. But what exactly are these attacks? Phishing is a deceptive tactic employed by cybercriminals to trick individuals into revealing sensitive information, like passwords or credit card details. Picture it as using a hook with bait to trick a fish — cybercriminals use tactics to trick you into giving away your valuable digital information. So, let’s dive in to understand these attacks and what you can do to protect yourself from becoming a victim.

Now that you understand how these happen, let’s go through the steps of spotting phishing attempts and what to do if you find yourself a victim.

Step 1: Recognizing Phishing Attempts

  • Check the Sender’s Email Address.

Legitimate organizations use official domains. Be cautious of misspelled or suspicious email addresses.

  • Inspect Email Content.

Phishing emails often contain spelling mistakes, grammatical errors, or an urgent tone. Legitimate organizations maintain professional communication.

  • Look for Unusual URLs.

Hover over links to preview the destination URL. Legitimate websites use HTTPS, and a mismatched or misspelled URL could be a sign of phishing.

  • Beware of Unexpected Attachments.

Do not open attachments from unknown sources. Phishing emails may contain malicious files that can compromise your system.

Step 2: What to Do if You’ve Fallen Victim

  • Stay Calm. Acknowledge that you’ve been targeted and avoid panic. Quick thinking is essential to mitigate potential damage.
  • Change Your Passwords. Immediately change the password for the compromised account. Use strong, unique passwords for each account to prevent further breaches.
  • Enable Two-Factor Authentication (2FA). Implement 2FA where possible. This adds an extra layer of security and makes it harder for attackers to access your accounts.
  • Scan Your Device for Malware. Run a reputable antivirus or anti-malware scan on your device to ensure it’s free from any malicious software installed during the phishing attack.
  • Monitor your Accounts. Regularly check your bank statements, credit reports, and other sensitive accounts for any unauthorized activities. Report suspicious transactions immediately.
  • Report the Phishing Attempt. Inform the legitimate organization that you’ve received a phishing email impersonating them. This helps them take action to protect others.
  • Educate Yourself and Others. Learn from the experience and educate yourself on common phishing tactics. Share your knowledge with friends and family to enhance their online safety.

Step 3: Preventing Future Attacks

  • Stay Informed. Keep yourself updated on the latest phishing techniques and cybersecurity trends to stay one step ahead of cybercriminals. Always be one step ahead and learn from others you can always follow me on my medium blog here Myra Jarenga — Medium blog to learn more on cybersecurity.
  • Use Email Filtering Tools. Enable email filtering to automatically detect and block phishing emails. Many email providers offer built-in protection like Avanan, Proofpoint and others. Doing more research will help you learn.
  • Verify Requests for Sensitive Information. Before sharing any personal or financial information, verify the legitimacy of the request through a trusted communication channel.
  • Attend Cybersecurity Awareness Training. Participate in cybersecurity training programs to enhance your knowledge and awareness of potential threats.

I’ve always used CISCO and IBM training programs to educate myself and stay ahead of the curve.

By following these steps, you can significantly reduce the risk of falling victim to phishing attacks and effectively respond if you do encounter one. Remember, staying vigilant and continuously educating yourself are key components of a robust cybersecurity defense strategy

Before you go I have also created a YouTube video to help you to always remember the above steps. “How To Spot Phishing Attacks” is a visual guide on safeguarding your online presence. Learn more about the tactics cybercriminals use and stay secure in the digital world. Don’t forget to subscribe for more cybersecurity insights. Want to learn more on cybersecurity find my e-book on introduction to cybersecurity and learn here https://myrajarenga.gumroad.com/subscribe

If you would like to connect with me you can do so on LinkedIn Myra Jarenga, you can also send me a DM on X @myrajarenga for us to chat more on this topic. You can support me by following me in order to learn more every week in order to learn how to stay secure online. Thank you.

--

--

Myra Jarenga
OSINT for all

A Cybersecurity analyst with customer service experience and AI expert.