Recognize and Avoid Spoofing/Phishing Scams
Spoofing
Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.
For example, you might receive an email that looks like it’s from your boss, a company you’ve done business with, or even from someone in your family—but it actually isn’t.
Criminals count on being able to manipulate you into believing that these spoofed communications are real, which can lead you to download malicious software, send money, or disclose personal, financial, or other sensitive information.
A scammer might:
- Spoof an email account or website. Slight variations on legitimate addresses (john.doe@examplecompany.com vs. john.doee@examplecompany.com) fool victims into thinking fake accounts are authentic.
- Send spearphishing emails. These messages look like they’re from a trusted sender to trick victims into revealing confidential information. That information lets criminals access company accounts, calendars, and data that gives them the details they need to carry out the schemes.
- Scammers pretend to be someone you trust. They make themselves seem believable by pretending to be connected with a company you know or a government agency.
- Scammers create a sense of urgency. They rush you into making a quick decision before you look into it.
- Scammers use intimidation and fear. They tell you that something terrible is about to happen to get you to send a payment before you have a chance to check out their claims.
- Scammers use untraceable payment methods. They often want payment through wire transfers, reloadable cards, or gift cards that are nearly impossible to reverse or track.
Phishing
Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to.
In a phishing scam, you might receive an email that appears to be from a legitimate business and is asking you to update or verify your personal information by replying to the email or visiting a website. The web address might look similar to one you’ve used before. The email may be convincing enough to get you to take the action requested.
How to Protect Yourself
- Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, links to family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.
- Don’t click on anything in an unsolicited email or text message asking you to update or verify account information. Look up the company’s phone number on your own (don’t use the one a potential scammer is providing), and call the company to ask if the request is legitimate.
- Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.
- Be careful what you download. Never open an email attachment from someone you don't know, and be wary of email attachments forwarded to you.
- Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
- Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with the person making the request. Can be done via Slack or on a call.
- Be especially wary if the requestor is pressing you to act quickly.
Common Scams
Fake Invoices
Unordered Office Supplies and Other Products
Directory Listing and Advertising Scams
Tech Support Scams
Social Engineering, Phishing, and Ransomware
Credit Card Processing
- Requesting Bitcoin
Keeping Yourself Protected | Documentation Link (expand link to view more) |
---|---|
Spam & Phishing in Gmail | |
Is that a real LF employee email? | |
Using 2FA or MFA | |
Using a VPN Provider | |
Keep Devices & Software up to date | Keeping Software, Devices & Applications up to date |