Skip to main content

Phishing – How to Spot It in 5 Steps

Phishing is one of the most common methods of cyberattacks – it involves impersonating trusted sources to steal our data or money. Recognizing phishing isn’t always easy, but there are a few simple tips that can help protect both you and your company from this threat.

  • By Witold Wojakowski, Michał Brandt
  • Case study
A bright yellow shield icon featuring a crossed hammer and wrench emblem at its center. The design is minimalistic, with subtle radiating lines suggesting protection or security. The palette is primarily yellow and white, conveying a clean and professional style.

Cybersecurity Awareness Month

This October, we are joining the global “Cybersecurity Awareness Month”, aimed at raising awareness about the importance of online safety. During our Cyber-Safe October, we will share practical tips for secure remote and office work and show you how to effectively protect yourself against different types of attacks. Stay tuned!

1. Check the Sender

  • Fake emails often come from addresses that look similar to real ones, e.g., instead of @raiffeisen.com it might be @raiffeisen-secure.com.
  • SMS messages may come from numbers or names that look official, but small differences in letters can reveal the scam.

2. Watch Out for Urgent Messages

  • Phishing often creates a sense of urgency: “Your account will be blocked”, “Log in immediately to avoid consequences”.
  • Legitimate institutions rarely demand immediate action without prior notice.

3. Check Links and Attachments

  • Do not click on links or open attachments from unknown senders.
  • Hover your mouse over a link in an email to see where it really leads. The address may not be connected to the institution it claims to represent.

4. Look for Language Issues and Errors

  • Fake messages often contain typos, odd phrasing, or translations that sound unnatural.
  • Watch out for inconsistencies in signatures, headers, or graphics – they may expose a scam attempt.

5. Verify Requests for Data or Transfers

  • No institution will ever ask you to provide passwords, PINs, or card details via email or SMS.
  • If you receive an unusual request for a money transfer, contact the sender directly through official channels.

Examples of Fake Messages:

  • Email: “Your bank account will be closed. Click here to confirm your details.”
  • SMS: “You have received a package. Check the link to collect your shipment: [fake link]”

Remember: Awareness and verification are the best defense against phishing.

Raiff Chat Tech Blog banner (4096 x 1024 px) - 3

Want to learn more? Check out our other articles published during Cyber-Safe October: