How to identify and avoid phishing attacks

Identify and avoid phishing attacks

Oct 7th 2020

Phishing scams are nothing new. Many of us, if not all, have received some form of phishing email whether we’re aware of it or not. Remember that PayPal claim you won, or the unexpected tax refund? All you had to do was ‘Click the link below!’

The beauty of phishing scams (depending on which way you look at it), is their ability to stay relevant. They can follow current trends. Stay on topic. Whatever hits the newspapers will most likely end up becoming a sophisticated phishing attack. Not only this, they can mimic almost any service or company imaginable. Many security issues can be resolved with software updates. However, phishing emails can never be “patched” so to speak. The best defence against scam emails is to understand, recognise, and report them.

With COVID-19 on everybody’s minds this year, malicious actors have stepped up and used the pandemic to their advantage to target vulnerable people. Sentrium is committed to security and we’ve listed below some of the tell-tale signs of a scam email. We hope you can use them to help keep yourself safe online. 
Below you will see an email which I received recently. Before we take a look, there is one question I believe we should all be asking when we receive something unexpected; Why did I receive this email? 

With that in mind, here goes.
Phishing email

If you received this email, what is the first thing you should be asking yourself? Did I apply for a grant? Is this applicable to me at all? The answer to these kinds of questions is quite often No.

Taking a closer look, the email is telling me my “second grant has been approved”. Well, that’s curious because I never received my first grant! 

So perhaps you believe that you may be entitled to a grant. After all, we’re in the midst of a pandemic and the government has a range of schemes to support UK businesses. You have most likely read about this in the news – it’s certainly a topical feature in our daily lives. What other warning flags are there in this email?

Delving deeper, the email sender’s name is “UK Government”. This sounds rather official, maybe it is real? Take a look at the email address (this has been viewed in Microsoft Outlook online, but most email programs show this information in a similar style).

Phishing email address


This doesn’t look official at all, not like a email address. This is a big tell that the email is not legitimate and is likely a phishing attempt. Granted, this is particularly easy to spot as suspicious and other senders may have more convincing addresses, so we can look for more characteristics of a phishing email to help us.

Moving on to the body of the email.

Phishing email content

The first sentence addresses me by my email address. If this were an official email and had stemmed from some previous communication, it would usually know my name and start the email with “Dear Name” or “Mr. Surname”.

Bad grammar: “The money are set to land in your bank accounts within six working days of making the claim”. This is unlikely to have been written by an employee of the UK government. 

Moving on, let’s assume that the email you received was from a seemingly official address, they addressed you by name, and it appears to be grammatically correct. Surely you can claim your money now? Not just yet, phishing emails usually have a theme:

  • Email is relevant in some way, from a popular service or is based on a current topic;
  • You are offered a high motivation or benefit to engage, and;
  • There is a sense of urgency.


Up until now, we’ve seen the first two points, the email is current and there is money to claim. How about the third point? Consider this sentence: “Keep in mind that the scheme closes on the 19 October 2020 so you have to hurry up”. A common tactic used to entice you to act quickly. 

Finally, we get to the core of a phishing scam. The link. Scammers need to direct you somewhere so they can harvest information, such as bank details. Therefore, the web addresses are usually hidden, in this case behind the text “Claim now >” so you can’t see where you’re heading before you click. Most modern browsers will display the web address in the bottom left of the page by hovering over the link, as seen below.

Phishing email link

The trouble scammers have is that they cannot simply use, because they have no control over the website and what content is shown to the user. This means they must use obscure web addresses like above.

If, after assessing each feature of the email, nothing stands out as fraudulent, what now? Ask yourself again, why did I receive this email? If you cannot answer this question then in all likelihood, it’s a scam and should be ignored. If you still have any doubt, contact the legitimate service or company that the email claims to be, and find out if it’s legitimate.


Introduction to Windows 11 (Beta) Security

Introduction to Windows 11 (Beta) Security

HTTP/3 and QUIC: A new era of speed and security

HTTP/3 and QUIC: A new era of speed and security?

Microsoft reports open redirection phishing tactic

Microsoft reports open redirection phishing tactics

Fortinet WAF allows remote code execution

Fortinet WAF allows remote code execution

Microsoft Exchange Bugs

Microsoft Exchange Proxy Vulnerabilities

PetitPotam: Windows AD CS NTLM Relay Attack

PetitPotam: Windows AD CS NTLM Relay Attack

What to do after your penetration testing report

What should you do after your penetration testin...

What is penetration testing and why is it important to use a CREST-approved provider?

What is penetration testing and why is it importa...

How secure use of the cloud can transform your business

How secure use of the cloud can digitally transfo...

How to prepare your business for secure cloud migration

How to prepare your business for secure cloud mig...

What is crest and how does it benefit you?

What is CREST and what are the benefits of using ...

How can the 10 steps to cyber security help to protect your organisation?

How can the 10 steps to cyber security help to pr...

The importance of cyber security

Celebrating Sentrium’s contribution to cyber secu...

What is OWASP Application Security

What is OWASP application security?

Pentration testing report

What should you do after your penetration testing...

Protect against a phishing attack

How to protect against a phishing attack

Secure data in cloud computing

How to secure data in cloud computing

The Security risks of cloud computing

What are the security risks of cloud computing?

Maintain security when employees work remotely

How to maintain security when employees work remo...

Penetration testing

What is penetration testing and why is it important?
  • Left Arrow Icon
  • Right Arrow Icon