Phishing is one of the most persistent digital threats. It preys on susceptibility, using urgency and pressure to make unwitting users give up their sensitive personal information, like login credentials and credit card details, to hackers. Many phishing campaigns use carefully crafted scam emails that cybercriminals can use to steal data or infect devices. To keep your personal data secure, you should know how to spot a phishing email and what you should do if you’ve accidentally become a victim of such scam campaigns.
Kamilė Vieželytė
August 21, 2025
Phishing emails are a scam method in which criminals send emails containing fraudulent links or file attachments to deliberately trick users into revealing their personally identifiable information. These emails often pretend to come from legitimate businesses and use visual elements that replicate genuine templates that the real sender would use.
In a classic phishing email scam, the email content urges the recipient to open a link within the email. The link may lead them to a login, signup, or checkout page. The user enters their personal information — for instance, username and password, home address, and credit card details. Unbeknownst to them, the website is unencrypted, and the cybercriminals on the other end can then collect this information, effectively stealing the data.
Instead of phishing links, cybercriminals can use malware-infected attachments to the email. If the user downloads the file and opens it, they release the malware into their device. Depending on the kind of virus the hackers used, it may restrict the user’s access to their device, create a backdoor for hackers to funnel personal information, or start logging everything the user enters with their keyboard to find out their login credentials and other sensitive information.
Sometimes, hackers pick a specific target and build a spear phishing campaign around them. Spear phishing emails may be more personal and harder to detect, using the target’s name and imitating services they may actually use.
Phishing emails tend to target personal or financial information. Cybercriminals can use stolen user data to impersonate them online, committing identity theft. They can also gather stolen credentials and sell them on the dark web. Using the information stolen through the phishing email, cybercriminals may conduct cyber extortion, demanding money from their target to remove their sensitive data from the criminals’ databases.
Over the years, phishing campaigns have become more elaborate and sophisticated. Nevertheless, you can still identify a phishing email by looking for irregularities in its content. By identifying and flagging phishing emails, you can prevent identity theft and protect your sensitive information. Take a look at the most common phishing email red flags — you might’ve encountered them before.
When you receive a potential phishing email, always check where it came from. The email address might look very similar to a legitimate service provider. However, the username or the domain might be off. For example, instead of a standard “[email protected]” email, it might look like “[email protected]” instead. Keep an eye out for these false address signs:
If you’re a long-time subscriber to a service, you may be used to promotional emails that address you by name. Generic greetings aren’t necessarily a sign of a scam — some businesses use “Dear customer,” or “Hello” as a default greeting. However, if it feels out of the norm, it might be phishing. The opening greeting of a scam email tends to be “Dear Sir/Madam” or “Hello, [email username].”
By using the email username, scammers are more likely to convince the target, especially if they use the same username on different platforms. However, if a company referred to you by your name in the past and has suddenly swapped to an unusual greeting, think twice about responding.
A core element of phishing attacks is building pressure. Scammers will press their targets to click the link or download the attachment quickly. They may insist that if the user doesn’t comply, they will be faced with fines or repercussions. Look out for terms like “Urgent: Act now” or “Overdue payments” in suspicious emails — those might be cybercriminals going after your money.
One misspelled word might be an incident. Multiple is a pattern. An email littered with weird sentences and typos is almost guaranteed to be a scam. Keep a sharp eye out for grammatical errors in the emails you receive. Official communications often go through multiple rounds of checks that wouldn’t let an error-ridden email to be sent, even for testing purposes. Bad grammar can mean bad intent.
It’s not just about what the email says — it’s how it looks. Companies that send newsletters, updates, and other information to their customers typically follow a set template as part of their design image. Scammers usually can’t imitate these templates. Instead, you might get an email with a design that looks broken. For example, components aren’t loading like they normally do, images appear broken, or the fonts are mismatched. It looks like a malfunctioning email.
However, if you happen to spot a phishing email with a weird template, avoid clicking its visual elements — cybercriminals can disguise clickable elements and hide malicious links behind broken images.
If the email is the bait, malicious links are the hook that catches the victims. Sometimes, the links are obvious — a highlighted word or a big flashy button that says “Click now.” However, cybercriminals can play coy with their phishing websites. A suspicious website can hide behind a header, an illustration, in the signature, or even the frame that surrounds the text.
To avoid accidentally clicking on any malicious links, hover over the entire email and don’t click anywhere. See how the link preview looks. If it has a domain inconsistent with the sender or is a combination of random letters and numbers, it may be disguising a scam.
Malicious attachments can be a bit more complicated than phishing links. Many email service providers nowadays have built-in filters that scan all file attachments to flag spam, meaning that many users don’t even encounter the risk of downloading these files. However, some emails manage to slip through the cracks.
Be wary of strange file names and formats that couldn’t be scanned. Likewise, .exe files can be used to disguise malware — if you download and open them, they run an installer hiding a virus. Cybercriminals can start causing damage to your device from the inside. Keep in mind that it doesn’t just affect computers — mobile devices can also be susceptible to malicious files.
Most reputable service providers, including financial, medical, and legal institutions, must adhere to strict and secure data handling practices. This means they won’t ask for their customers’ credit card information, Social Security numbers, or passwords via email.
Scammers, on the other hand, often ask their targets to submit highly sensitive information using unencrypted channels, like email. If an impersonator is asking you to provide personal information related to your identity, check the real company’s policy — it’s likely they have a statement about what information they may request and what customer data they store.
Phishing emails can be pesky, and their “authors” seek new ways to get around the usual spam filters to convince the target it’s not actually a scam. If it’s obvious at first glance that an email is malicious, even if it has managed to escape your inbox’s spam filters and hit your primary or promotional inbox, mark it as spam and delete it immediately. Don’t click any components, because they might contain malicious links.
If you receive multiple emails from the same sender, you can block their address to prevent further spam. Flagging and blocking spam accounts helps your email provider better identify and prevent future phishing mail from reaching you.
Workplace email scams are commonplace. A cybercriminal pretending to email on behalf of a CEO, asking to remind them of the login credentials to a confidential account, has proven to be surprisingly effective. If phishing emails are targeting your work-related inbox, inform your company’s IT department immediately.
Phishing campaigns can be very convincing, which is why they remain an effective tool for cybercriminals. People unwittingly give up their personal information and account access to hackers, thinking the phishing email was business as usual. The criminals might then use this data to impersonate their targets.
Common signs of identity theft include an influx of suspicious emails and phone calls, loans being taken out in your name, and debt collection notices. The good news is that even if you’ve become a victim of phishing, you can still protect your sensitive information online and protect yourself from becoming a victim of identity fraud.
If you entered your login credentials on the scam website, you must change that password immediately. If you’ve reused the same login details for multiple accounts, make sure to update them too — if your password is compromised once, the other accounts are also at risk. Use strong and unique passwords for all accounts. Ideally, they should be at least eight characters long and use a combination of uppercase and lowercase letters, numbers, and special characters. You can use a password manager to generate and manage different credentials.
You might not be the only victim of the phishing campaign. Report the scam email to the website it pretended to come from. That way, news about the scam can get out faster, and the platform can inform other users about the phishing attempts. Each platform might have its own method to report phishing emails. Usually, you can forward the phishing email to the platform’s support channels.
If cybercriminals got access to your financial information, you must inform your credit issuers and bank immediately. You can freeze your bank card to prevent unauthorized transactions. Likewise, you can set up a credit lock or freeze, which can stop criminals from attempting to take out loans in your name.
If you’re targeted by a regular phishing scam or an AI phishing scam, you can report the incident to America’s Cyber Defense Agency (CISA). If the scam is related to your financial information, alert the Federal Trade Commission (FTC) as well. You should also consider filing a police report to create an official record of the crime, which can help track down the perpetrators.
Stolen credentials might remain dormant for a while. If you’ve accidentally provided your sensitive information to hackers, monitor accounts that can be traced back to it. Even if you don’t notice any suspicious activity, you should change your login details to protect your accounts from unauthorized access.
If your login credentials were stolen in a phishing attack, you can still prevent criminals from using them effectively. Log in to any impacted account, change every vulnerable password, and set up multi-factor authentication. With this extra security step, cybercriminals won’t be able to verify their login attempts.
If possible, you can also change your passwords into passkeys — a more robust security measure that combines encryption and biometric authentication, ensuring only you can access your account.
Routinely check your device for viruses after a phishing scam. If you’ve accidentally installed malware on your device, use an antivirus to detect, quarantine, and remove the virus. Run a thorough scan cycle to find deeply buried viruses and prevent them from causing damage or stealing your data.
Chances are you’ve received at least a few phishing emails in the past year. You can reduce their frequency and protect your inbox from becoming a target for phishing campaigns by adopting a few cybersecurity strategies in your day-to-day.
Kamilė is curious about all things compliance. She finds the prospect of untangling the complicated web of cybersecurity legislation satisfying and aims to make the nuances of identity theft prevention approachable to all.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.