8 Min Read | Updated: November 30, 2023

Originally Published: October 28, 2020

Phishing Attacks: How to Recognize and Avoid Them 

Phishing scams that aim to steal your information remain extremely common, but basic precautions can help you spot them and avoid falling for them.

Phishing

This article contains general information and is not intended to provide information that is specific to American Express products and services. Similar products and services offered by different companies will have different features and you should always read about product details before acquiring any financial product.

At-A-Glance

Phishing is a very common type of cybercrime that aims to trick people into revealing personal information, which is often then used for financial gain.

Most phishing attacks occur via email, but scammers can also use text and voice messages – aka “smishing” and “vishing.”

Basic precautions can help you to spot many phishing scams and take steps to avoid them.  


Have you ever received emails like these?

 

  • An offer of a free subscription from a leading streaming service.
  • A message from your bank or credit-card provider telling you there’s a problem with your account.
  • A prestigious retail brand offering you a coupon for 20% off, out of the blue.
  • A government agency saying you’re entitled to a big tax refund. 

If you’re tempted to click, think again. These may be phishing emails: phony messages from criminals seeking to trick you into revealing information that they can use for a variety of purposes, such as draining your financial accounts or stealing your identity. In 2022, the FBI’s Crime Complaint Center (IC3) received 800,944 complaints of cyberattacks and incidents.1 Since phishing email scams are on the rise, it’s important to learn to recognize and avoid them.1

What Is Phishing?

Phishing is a crime in which someone poses as a legitimate institution in order to trick you into revealing sensitive information, such as:

 

  • Personal information like your Social Security number, name and address, and mother’s maiden name.
  • Bank or credit card account details.
  • Usernames and passwords.   

Phishing criminals typically aim to convince you to click on malware or to type your personal information into a form. To increase their chances of success, criminals often try to impersonate well-known organizations that you may trust, such as:

 

  • Banks.
  • Credit card companies.
  • Big retailers.
  • Government agencies.
  • Big technology firms and social networking sites. 

One common way that phishing emails try to get your information is by asking you to click on a hyperlink in the message. If you click on the link, you may be taken to a website that looks like an official login page, asking you to enter identifying information such as your username and password, or perhaps your full name and Social Security number. Type in the data, press return, and voilà! The scammers now have what they want.2 

 

While many phishing attempts occur via email, it’s not the only method.3 Criminals sometimes also use phone calls, which is called vishing, or text messages, which is called smishing after “SMS” (short message service), the original acronym for texts.2

What Are the Risks of Phishing Attacks?

If criminals succeed in stealing someone’s information using a phishing attack, they may use it in a variety of ways, depending on the information they’ve stolen.3,4,5

 

  • Apply for credit cards or services: They may use personal information like your date of birth, Social Security number, and address to apply for credit cards in your name, open utility accounts, or even try to get medical care.
  • Drain your financial accounts: If they get your bank or credit card login, they may be able to start buying things using your account or simply take your money.
  • Access your other accounts: Many people reuse the same username and password for multiple services. You might think that it’s not a big deal if attackers get your login information for a streaming service. But they may try reusing those same login details to access your bank account. They might even be able to get into your employer’s email system and create problems for the entire organization.
  • Sell the information: Thieves may sell your data on an underground online marketplace. Other criminals buy that information and may use it, perhaps months later.

Common Phishing Attack Tactics and How to Spot Them

Why do phishing attacks still work, even though people have known about them for decades? It’s largely because criminals constantly come up with new ways to evade email filters and convince people to click. Because of that, there’s no single characteristic that you can use as a sure way to identify a phishing email. But there are common telltale signs:3,6

 

  • Appealing offers: If it seems too good to be true, it probably is. Be extra cautious and check for legitimacy.
  • Urgent action needed: Attackers often inject a sense of urgency to make you feel you need to act straightaway. They may tell you your account has been suspended or that they’ve detected suspicious activity – and you must log in immediately to fix the problem. If you get such a message, call the number on the back of your card to see whether there is indeed an issue with your account.
  • Current events: Attackers use current events and concerns to grab your attention. Watch out for phony special offers during the holiday shopping season, or messages from the IRS during the tax filing season.
  • Unusual senders: If the sender isn’t who you’d expect, the message may be fake. But be careful: It’s easy for scammers to make it look like emails come from a reputable organization.
  • Incorrect recipients: Phishing emails may not address you by name – “Dear Customer” – or may even use an incorrect name.
  • Attachments or links: Any emails containing attachments or links should be treated with suspicion, especially if links in the message don’t match the real organization’s web address. Scammers may disguise malicious links with innocent-looking text or, for example, use a “1” in place of an “l” – which is almost undetectable. 

It’s worth being extra careful if someone you don’t know offers you a gift card in any context. Gift card scams are always present and usually increase during the holidays. These are some popular gift card scams:7

 

  • Boss scam: Scammers impersonate a senior manager in your company, requesting that you purchase gift cards and send them the cards’ codes.
  • Secret shopper scam: They impersonate a major corporation and pretend to hire you as a secret shopper. They send a check for you to use to purchase gift cards, keep a portion as your “pay,” and send back codes for the rest – except the check bounces after you’ve made the purchase.
  • IRS scam: Someone impersonating an IRS agent tells you your identity was stolen and asks you to buy gift cards using different accounts to help them identify the culprits.
  • Tech support scam: In this one, the scammer sends an email that appears to lock up your computer or mobile device, then pretends to be a tech support person stepping in to help – for a price.

Some Phishing Attacks Are More Sophisticated

While some phishing attempts are easy to spot, others can be much more sophisticated and harder to distinguish from genuine emails.  

 

For example, in so-called “spear phishing” attacks, criminals carefully target specific people whom they think will have access to sensitive data, such as company executives or employees who handle electronic payments.6 The scammers spend time researching their targets’ personal lives, using sources such as social media. Armed with that personal information, they can craft phishing emails that are much more convincing – for example, with details about a person’s recent vacation destination or their kids’ sports activities.8  

 

It’s also become much easier for attackers to include corporate logos and website content that look exactly like the real thing because they can buy “phishing kits” that include almost everything they need to imitate widely used and trusted brands.9

Vishing and Smishing

Some attacks use voice or text messages instead of email:2,10

 

  • Vishing: Some scammers may leave voice messages or even use live phone calls containing phishing lures to get you to reveal your information over the phone. They may appear to be calling from a legitimate local number, even if they’re not.
  • Smishing: Some phishing attacks use text messages because people are sometimes more likely to trust text messages than emails. The approach is known as smishing because SMS is an acronym for the technology used to send texts – it means Short Message Service. Like phishing emails, these texts may include links to phony websites.

How to Prevent Phishing Scams

If suspicious emails arrive in your inbox, here are some ways to help avoid falling for a phishing scam:2,3

 

  • Don’t respond to a message unless you’re sure you recognize the sender and don’t see any of the warning signs listed above. It’s easy for scammers to make it look like emails come from legitimate institutions, but major email systems generally provide a way to identify the real sender and where your reply will be sent.
  • Don’t click on an attachment or link unless you’re sure it’s legitimate. Attackers can disguise bad links behind innocent-looking text, but if you’re using a computer you can generally hover your cursor over the link to reveal the real URL. Many types of attachments can conceal malware that steals data or causes other problems, including spreadsheets and word-processing documents.
  • If a request seems odd, unusual, or suspicious, it probably is. If it appears to be from someone you know, try contacting them by phone or another method to make sure they really sent the request.
  • When in doubt, visit a website directly by typing the address into your browser instead of clicking on a link.
  • Protect your accounts with multifactor authentication. This adds a layer of safety by requiring an additional identification method to log in to your account, like a passcode delivered via text message.

The Takeaway

Phishing attacks that aim to steal your information remain one of the most widespread kinds of cyberattacks today. But they don’t work without your own participation. Fortunately, basic precautions can help you to spot, and avoid falling for, many phishing scams.


Mike Faden

Mike Faden has covered business and technology issues for more than 30 years as a writer, consultant and analyst for media brands, market-research firms, startups, and established corporations.

 

All Credit Intel content is written by freelance authors and commissioned and paid for by American Express. 

Related Articles

How to Manage Internet Security Risks to Your Credit Card

 

If you use credit cards online, it’s important to learn how to protect yourself from common cybersecurity risks. Most card issuers and merchants can help keep you safe, too.

 

Tell me more

Should You Use an Identity Theft Protection Service?

 

Identity theft protection services can help you safeguard your identity for a fee. While there are ways to protect yourself, many feel that such services are worth the cost.

 

Tell me more

Mastering Credit Card Fraud Detection

 

Protect yourself from credit card fraud by using technology, statement and credit report reviews, and recognizing common fraud tactics.

 

Tell me more

The material made available for you on this website, Credit Intel, is for informational purposes only and intended for U.S. residents and is not intended to provide legal, tax or financial advice. If you have questions, please consult your own professional legal, tax and financial advisors.