{"id":2350,"date":"2019-01-21T14:39:15","date_gmt":"2019-01-21T14:39:15","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1859"},"modified":"2022-12-02T15:25:25","modified_gmt":"2022-12-02T09:55:25","slug":"security-advisory-email-phishing","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/","title":{"rendered":"Security Advisory &#8211; Email Phishing"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475-1024x512.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"phishingemails11 - Varutra Consulting\"\"><br \/>\nIn today\u2019s era, email is still used as one of the primary ways to communicate, which is not only restricted to our everyday work but also to stay in touch with our near and dear ones. Additionally, email is also used by companies to provide their services like to help a user to get online banking statements, online software updates etc. With all the benefits it provides, let us not forget the security risk it brings in. Email Phishing scams have become one of the prime attack methods used to trick a user into giving their personal information such as credit card numbers, passwords etc by performing phishing email campaign.<\/p>\n<p>In mid-January 2018, security researchers reported phishing activity in which the attackers compromised <strong>MailChimp<\/strong> accounts to send out fake invoice notifications. At the time of discovery, security experts concluded that criminals abused weak, breached and reused credentials to hack users\u2019 <strong>MailChimp<\/strong> accounts. In 2017, the same case happened with <strong>NETFLIX<\/strong> members. They got phishing mail asking them to restart their membership. According to a survey of Symantec 2018 <strong>Internet Security Threat Report<\/strong> (ISTR), by the end of 2017, the average users would have received 16 malicious emails per month.<\/p>\n<p>Phishing is constantly evolving and is due to users\u2019 unawareness and lack of knowledge about malicious URL links, attachments. This article is going to help you understand how phishing scam happens, how to identify them and protect yourself.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How attackers perform malicious activity? <\/strong><\/h3>\n<p>The following example illustrates a phishing scam attempt<\/p>\n<p><strong>1. Attacker Creates a Phishing Page:<\/strong><\/p>\n<p>An attacker creates a phishing page (malicious page) which looks like a legitimate page using different framework techniques. An attacker then hosts that phishing URL by using free or paid web hosting server. This malicious link is attached to the fake email generator tool which sends fake mail to victim asking about their personal information.<\/p>\n<p>&nbsp;<\/p>\n<h6 style=\"text-align: center\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Phishing-Page-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1936 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Phishing-Page-2.png\" alt=\"PoC: Email Phishing Scam page\" width=\"1441\" height=\"806\" \/><\/a><strong>PoC: Phishing page<\/strong><\/h6>\n<p><strong>2. Victim\u00a0Enters Credentials:<\/strong><\/p>\n<p>Without verifying if the link belongs to an original domain, the victim unknowingly clicks on a malicious link. This link is connected with the phishing page created by the attacker. As phishing page looks exactly like the legitimate page .He\/she enters their personal sensitive information e.g. user credentials, banking information, personal information etc.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/User-Credentials-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1925 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/User-Credentials-1.png\" alt=\"PoC: User Credentials\" width=\"1423\" height=\"630\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h6 style=\"text-align: center\"><\/h6>\n<h6 style=\"text-align: center\"><\/h6>\n<h6 style=\"text-align: center\"><\/h6>\n<h6 style=\"text-align: center\"><\/h6>\n<h6 style=\"text-align: center\"><\/h6>\n<h6 style=\"text-align: center\"><strong>PoC: User Credentials<\/strong><\/h6>\n<p><strong>3. Information Captured by Attacker:<\/strong><\/p>\n<p>As phishing page is linked with the attacker database server, any data fed by the victim to the malicious page is accessible by the attacker. By using this information, an attacker can carry out further malicious activities.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Credentials-Capture.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1864 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Credentials-Capture.png\" alt=\"PoC: Credentials captured by the attacker\" width=\"1428\" height=\"626\" \/><\/a><\/p>\n<h6 style=\"text-align: center\"><strong>PoC: Credentials captured by the attacker<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<h3><strong>\u00a0<\/strong><strong>How to identify a phishing email?<\/strong><\/h3>\n<p><strong>1. Always be suspicious:<\/strong><\/p>\n<p>Phishing emails try to freak you out with warnings of stolen information and then offer an easy fix if you just &#8220;click here&#8221;. When you are in doubt open your browser, go to the company&#8217;s website, then sign in normally to see if there are any signs of strange activity. If you&#8217;re concerned, change your password.<\/p>\n<p><strong>2. Detect a fake link<\/strong>:<\/p>\n<p>To find a fake mail, you can move your mouse on the link. You will see the real link pop up after a few seconds. You could right-click on the link, copy it and then paste it into a text document to see where it would really redirect you to the original website. When you are looking at the URL look for any spelling mistakes in domain name. A fraudulent email might link to http:\/\/&#x77;&#x77;&#x77;&#x2e;&#x65;&#x78;&#x40;<span class=\"oe_displaynone\">null<\/span>&#x6d;&#x70;&#x6c;&#x65;&#x2e;&#x63;&#x6f;&#x6d; instead of http:\/\/www.example.com<\/p>\n<p><strong>3. Check the instruction:<\/strong><\/p>\n<p>Any legitimate company that&#8217;s sending a security notification will never ask you to click a button or link or download an attachment. The attacker will tell you to go to its website home page and log in to your account from there. Also, an attacker might tell you to call customer service with any questions.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/fake-phish.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1917 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/fake-phish.png\" alt=\"PoC: How to identify phishing email scams\" width=\"1139\" height=\"398\" \/><\/a><\/p>\n<h6 style=\"text-align: center\"><strong>PoC: How to identify phishing email<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<h3><strong>How to avoid email phishing scams?<\/strong><\/h3>\n<p><strong>1. Implement strong authentication<\/strong>:<\/p>\n<p>Use two-way verification method. Even though your account credentials were stolen attacker will not be used that account for doing any criminal activity.<\/p>\n<p><strong>2. Do not click on attachments:<\/strong><\/p>\n<p>You should not click on the attachments sent by any anonymous email id. It might contain malware that can damage files on a victim\u2019s computer, steal passwords or spy online activity without their knowledge.<\/p>\n<p><strong>3. Deploy a SPAM filter:<\/strong><\/p>\n<p>Downloading a good spam filter is essential to catch phishing emails before they end up in an inbox and to prevent accidental opening of malicious attachments through an unwary user.<\/p>\n<p><strong>4. Deploy a web filter to block malicious web applications:<\/strong><\/p>\n<p>A browser-integrated anti-phishing solution, such as <strong>SpoofGuard<\/strong> and <strong>PwdHash<\/strong>, could provide effective help by protecting against unauthorized IP and MAC addresses to prevent and mitigate online scams.<\/p>\n<p><strong>5. Conduct training sessions with mock phishing scenarios:<\/strong><\/p>\n<p>In most cases, phishing attack requires user action to succeed so it is obvious to make the employee aware.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Phishing is a form of social engineering attack used to collect personal, banking information etc. from the affected victim.\u00a0It is important to stay aware of the different phishing techniques and to keep your computer and internet browsers up to date with current antivirus and security patches. Be Safe!<\/p>\n<p>Author,<\/p>\n<p><strong><em>Aniket Shinde<\/em><\/strong><\/p>\n<p><em>Attack &amp; PenTest Team<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":2966,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,270,277,293,266,273,271,294],"tags":[201,202,203,204,205,206,207,208,209,210,211],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Email Phishing Scam - Overview and Security Advisory\" \/>\n\t\t<meta property=\"og:description\" content=\"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"email attack\" \/>\n\t\t<meta property=\"article:tag\" content=\"email fraud\" \/>\n\t\t<meta property=\"article:tag\" content=\"email phishing\" \/>\n\t\t<meta property=\"article:tag\" content=\"fake email\" \/>\n\t\t<meta property=\"article:tag\" content=\"fraud\" \/>\n\t\t<meta property=\"article:tag\" content=\"phish\" \/>\n\t\t<meta property=\"article:tag\" content=\"phishing\" \/>\n\t\t<meta property=\"article:tag\" content=\"phishing attack\" \/>\n\t\t<meta property=\"article:tag\" content=\"phishing mail\" \/>\n\t\t<meta property=\"article:tag\" content=\"scam\" \/>\n\t\t<meta property=\"article:tag\" content=\"types of phishing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2019-01-21T14:39:15+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:55:25+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Email Phishing Scam - Overview and Security Advisory\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#article\",\"name\":\"Email Phishing Scam - Overview and Security Advisory\",\"headline\":\"Security Advisory &#8211; Email Phishing\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/phishing-emails-1-1-1-wpp1596537802475.jpg\",\"width\":1200,\"height\":600,\"caption\":\"phishing-emails-1-1\"},\"datePublished\":\"2019-01-21T14:39:15+05:30\",\"dateModified\":\"2022-12-02T15:25:25+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#webpage\"},\"articleSection\":\"Case Study, Data Leakage, Data Privacy, Email Phishing, Security Advisory, Security Best Practices, Social Engineering Attack, SPAM, email attack, email fraud, Email phishing, fake email, fraud, phish, phishing, phishing attack, phishing mail, scam, Types of phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#listItem\",\"position\":2,\"name\":\"Security Advisory - Email Phishing\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/\",\"name\":\"Email Phishing Scam - Overview and Security Advisory\",\"description\":\"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/phishing-emails-1-1-1-wpp1596537802475.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#mainImage\",\"width\":1200,\"height\":600,\"caption\":\"phishing-emails-1-1\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-advisory-email-phishing\\\/#mainImage\"},\"datePublished\":\"2019-01-21T14:39:15+05:30\",\"dateModified\":\"2022-12-02T15:25:25+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Email Phishing Scam - Overview and Security Advisory<\/title>\n\n","aioseo_head_json":{"title":"Email Phishing Scam - Overview and Security Advisory","description":"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Email Phishing Scam - Overview and Security Advisory","og:description":"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","og:image:width":"1200","og:image:height":"600","article:section":"Case Study","article:tag":["email attack","email fraud","email phishing","fake email","fraud","phish","phishing","phishing attack","phishing mail","scam","types of phishing"],"article:published_time":"2019-01-21T14:39:15+00:00","article:modified_time":"2022-12-02T09:55:25+00:00","twitter:card":"summary_large_image","twitter:title":"Email Phishing Scam - Overview and Security Advisory","twitter:description":"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#article","name":"Email Phishing Scam - Overview and Security Advisory","headline":"Security Advisory &#8211; Email Phishing","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","width":1200,"height":600,"caption":"phishing-emails-1-1"},"datePublished":"2019-01-21T14:39:15+05:30","dateModified":"2022-12-02T15:25:25+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#webpage"},"articleSection":"Case Study, Data Leakage, Data Privacy, Email Phishing, Security Advisory, Security Best Practices, Social Engineering Attack, SPAM, email attack, email fraud, Email phishing, fake email, fraud, phish, phishing, phishing attack, phishing mail, scam, Types of phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#listItem","position":2,"name":"Security Advisory - Email Phishing","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/","name":"Email Phishing Scam - Overview and Security Advisory","description":"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#mainImage","width":1200,"height":600,"caption":"phishing-emails-1-1"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/#mainImage"},"datePublished":"2019-01-21T14:39:15+05:30","dateModified":"2022-12-02T15:25:25+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2350","title":"Email Phishing Scam - Overview and Security Advisory","description":"Email phishing scams have become one of the prime attack methods used to trick a user into giving their personal information using phishing email campaigns.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Email Phishing\",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Phishing\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Phishing Email\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Phishing Scams\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Email Phishing Scams\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/phishing-emails-1-1-1-wpp1596537802475.jpg","og_image_width":"1200","og_image_height":"600","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 10:05:38"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tSecurity Advisory \u2013 Email Phishing\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Security Advisory &#8211; Email Phishing","link":"https:\/\/www.varutra.com\/varutravrt3\/security-advisory-email-phishing\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2350"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2350"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2350\/revisions"}],"predecessor-version":[{"id":20346,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2350\/revisions\/20346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2966"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}