Home / Technology / How to Identify Bogus Banking Emails

How to Identify Bogus Banking Emails

phishingFake emails are sent by criminals in order to get your money, or to take advantage of your computer’s processing power and Internet connection to launch Web-clogging Denial of Service attacks on other networks.

This practice, aka “phishing,” works by embedding dummy Trojan software on your PC, or by getting you to visit fake websites to enter personal details, or by capturing personal details directly from your computer.

The emails are often hard to spot and can look like they come from common financial institutions and social networks.

Here’s identify those emails:

Step 1: Notice the Red Flags

Red flags include

  •     requests for personal information such as banking details and password changes;
  •     prompts to click on links or download attachments; and
  •     requests from institutions you don’t already have a relationship with.

Treat any red flag emails with caution and proceed to the next steps.

Warning: Don’t click on a link within an email if you have any doubt as to the legitimacy of the message.

Step 2: Don’t Panic

Be wary of alert-style text within emails that suggests your security has been compromised and that the embedded link you are being urged to click on will fix the problem. This is a pressure technique that instills a sense of urgency. Just as you would in entering a common purchasing transaction, take time to evaluate. Look for language that implies something onerous will happen if you don’t click on the link within the email message — for example, that your account will be closed.

Tip: Look for bad grammar, strange capitalization or spelling mistakes. Legitimate companies usually put effort into catching mistakes before releasing an email. Peculiar text can be used to circumvent spam software.

Step 3: Look Closely at Links

Place your mouse over the common language link in the email — again, without clicking on the link — to see if the link’s Web address is repeated within the status bar on the browser or email client.

A legitimate link will echo the text in the message. For example, the link in a message from the XYZ Bank will read https://www.xyzbank.com/link, or similar, rather than http://somethingelsefakebank.com/link or similar, or a series of numbers, called an “IP address,” like http://192.111.111.111/link, or similar.

The secure designation “https,” rather than the generic “http,” will precede a legitimate transactional website. The “s” means it’s secure.

Tip: Look for marginally changed link addresses, for example XYX Bank, rather than the legitimate XYZ Bank. Again, don’t click on the link.

Step 4: Check the Header

Check the sender’s actual address inside message header contrary to the From address. The displayed From name is simpler to fake compared to the sending mail deal with. The actual deals with should match, or the mailing mail address really should clearly be caused by a legitimate institution sending some text.

Look for a lack of personalization within the message. Generally, but not always, a classic phishing email will not include personalization. Banks try to differentiate themselves from phishers by using personalization. A “Dear XYZ Bank Member” is an example of bogus message, whereas “Dear Mr. Smith” is likely legitimate.

Warning: Legitimate institutions will not send downloadable email attachments unless you have already entered into a dialog with them about it — for example instrument copies. Never download attachments with a “.exe” extension.

Step 5: Take the High Road

Browse on the sender’s website directly. Do this by manually entering the internet address root in a Internet browser address bar. Then use the website’s navigation to find the information referred to in the e-mail message.

If the email concept was legitimate, the contents are going to be available at the website as well.

Tip: When browsing, check the browser’s address bar for the correct institution’s address — for example, XYZ Bank. Even if the Web address has the bank’s name in it, it may not be the bank’s website. For example, XYZBankSecure.net, is not the same as XYZ Bank.com

Warning: Never enter bank login details after following an emailed link. Always log in to the bank directly from a fresh tab in a Web browser. Never enter details in pop-up windows.

Step 6: Good Riddance

Delete the bogus email message.

Tip: You can report bogus emails. Many email clients have ways to mark messages as scams. Look for “Mark as phishing scam,” or similar, adjacent to the message.

Alternatively, report phishing to the Anti-Phishing Working Group, or APWG.

Source: TechNewsWorld

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Scroll To Top