{"id":10014,"date":"2021-05-26T10:20:08","date_gmt":"2021-05-26T14:20:08","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=10014"},"modified":"2026-01-15T10:05:59","modified_gmt":"2026-01-15T15:05:59","slug":"phishing-scams-how-to-spot-them","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/","title":{"rendered":"Phishing Scams: How to Spot Them and Stop Them"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg\" alt=\"\" class=\"wp-image-10021\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By David Barnett, Subject Matter Expert \u2013 Brand Monitoring<\/p>\n\n\n\n<p>Phishing scams are nothing new in the online security world and show no signs of subsiding. The scam starts when a fraudster sends a communication purporting to originate from a trusted provider and encourages the recipient, often with a conveyed sense of urgency, to click a link. That link leads to a fake site, usually intended to collect confidential login credentials or other personal information. In similar scams, the mail may encourage the recipient to open an attachment loaded with malicious content.<\/p>\n\n\n\n<p>The communications are often sent to a large list of recipients whose contact details have usually been \u201charvested\u201d from the internet (databases with this kind of information are tradable commodities in their own right). The fraudsters hope that some of the recipients will be genuine customers of the organization being impersonated. In other cases, personal details may be obtained via a breach of a company\u2019s customer database, allowing the fraudster to construct a much more tailored attack.<\/p>\n\n\n\n<p>The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links. The Anti Phishing Working Group (APWG) found that in just the second quarter of 2020, almost 147,000 phishing sites were detected, with more than 350 distinct brands targeted each month. These sites crossed a range of industry verticals, topped by Software-as-a-Service and financial services<sup>[1]<\/sup>. Similar trends were also reported for Q4<sup>[2]<\/sup>.<\/p>\n\n\n\n<p>As long as phishing attacks generate revenue for criminals, the practice will perpetuate. It continues to evolve by using new \u201chooks,\u201d communication channels, and increasingly clever ways of creating convincing fake content. This highlights the need for brands to defend their customer base by using monitoring and takedown technology. Nearly 60% of organizations worldwide reported that they had experienced a successful phishing attack during 2020<sup>[3]<\/sup>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A recent phishing example\u2014and identification tips for consumers<\/strong><\/h3>\n\n\n\n<p>Figure 1 shows an example of a phishing communication sent by SMS. Text messaging remains a popular channel for distributing phishing content, with many brands (including numerous examples outside the most-attacked industries) reported as having been targeted in this way during 2021. The U.K.\u2019s Royal Mail, for example, saw an overall 645% increase in phishing activity for March 2021, compared with the previous month<sup>[4]<\/sup><sup>,[5]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"771\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Scam-1-1024x771.png\" alt=\"\" class=\"wp-image-10016\" style=\"width:549px;height:413px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-1-1024x771.png 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-1-300x226.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-1-768x578.png 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-1.png 1257w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong><span style=\"color:#003b5c\" class=\"has-inline-color\">Figure 1:<\/span><\/strong> Example of an SMS-based phishing attack targeting HSBC customers, received on April 25, 2021<\/p>\n\n\n\n<p>The example shown in Figure 1, targeting HSBC customers, incorporates several elements making it a relatively convincing example of a phishing scam. The link features a cursory similarity to an official link for HSBC U.K. (whose official domain name is hsbc.co.uk). The link also incorporates the HTTPS prefix, and the communication lacks much of the poor spelling and grammar often present in phishing scams.<\/p>\n\n\n\n<p>There are, however, many tell-tale elements consumers should look out for. The key point is that the URL is not actually hosted on an official HSBC site. The place to look is in the domain name part of the URL, consisting of a top-level domain (TLD)\u2014or extension\u2014such as .com or .co.uk, and (separated by a dot) the second-level domain name which immediately precedes it. In a URL, this occurs immediately before the first slash (\/) after the initial protocol definition (in this case, https:\/\/), or in cases where there is no slash, at the very end of the URL.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"464\" height=\"183\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Scam-2.png\" alt=\"\" class=\"wp-image-10017\" style=\"width:384px;height:151px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-2.png 464w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-2-300x118.png 300w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><\/figure>\n\n\n\n<p>In the HSBC scam here, the domain name is actually \u201cuk-account.help,\u201d a domain name wholly independent of anything owned by HSBC and under the control of a third-party fraudster. The owner of this domain can create whatever subdomain string (the part before the domain name) they wish, and so has constructed the fake site at \u201chsbc.co.uk-account.help,\u201d which superficially appears very similar to \u201chsbc.co.uk\/account\/help,\u201d a URL which would be part of the official hsbc.co.uk site.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"152\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Scam-3.png\" alt=\"\" class=\"wp-image-10018\" style=\"width:459px;height:126px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-3.png 552w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-3-300x83.png 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/figure>\n\n\n\n<p>In other cases, scammers may register domains that use the actual brand name of the targeted organization but weren\u2019t included in the brand owner\u2019s domain portfolio (e.g., using a version with additional keywords or a different domain extension). The phony domain could feature a brand variant or misspelling as a way of creating a convincing URL. <\/p>\n\n\n\n<p>Phishing communications that use \u201cricher\u201d formatting (e.g., HTML emails) can construct a message where the visible link may be a URL from the brand owner\u2019s official site, but the destination URL accessed by clicking the link is a distinct and fraudulent address. In these cases, users should hover over the link with a mouse, which usually shows the actual destination URL.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"730\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Scam-4-1024x730.png\" alt=\"\" class=\"wp-image-10019\" style=\"width:682px;height:486px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-4-1024x730.png 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-4-300x214.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-4-768x547.png 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-4.png 1026w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong><span style=\"color:#003b5c\" class=\"has-inline-color\">Figure 2:<\/span><\/strong> Example of HTML email showing the actual destination URL (highlighted in red) revealed by \u2018mouse-overing\u2019 the link<\/p>\n\n\n\n<p>In addition to the non-legitimate domain name, other factors in the HSBC SMS scam\u2014such as the message originating from a standalone mobile number and the communication text including all of the textbook elements of a phishing scam (e.g. a legitimate service provider would almost never send an unpersonalized communication to a customer)\u2014should also raise red flags.<\/p>\n\n\n\n<p>This particular scam also incorporates a couple of additional interesting elements. First, the fraudulent domain is hosted on the .help extension, one of the newer gTLDs launched in 2014<sup>[6]<\/sup>. This may be less immediately recognizable as an extension\u2014and therefore part of the domain name itself\u2014to users more familiar with the traditional extensions such as .com and .co.uk.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<p>Second, the embedded link uses the secure HTTPS protocol, frequently tipped as a point to check when verifying a link\u2019s authenticity. Although it generally indicates that the web traffic is encrypted during transit, it doesn\u2019t guarantee that the destination site is genuine. There are many budget providers of digital certificates (which enable a site to use the HTTPS protocol), that will sell them without any checks on the legitimacy of the site in question. In fact in Q2 2020, 78% of phishing sites were found to be employing digital certificates, up from 5% at the end of 2016<sup>1<\/sup>.<\/p>\n\n\n\n<p>The final notable element of this scam is that the domain in question (uk-account.help), despite only being registered on April 25 (see Figure 3), had actually been deregistered by the following day (and accordingly no longer resolved to any live site). Although the brand owner (or an associated brand-protection service provider) may have quickly taken the site down, the use of a domain and related phishing site that is so short-lived is typical of fraudsters hoping to generate quick revenue before the brand owner can discover the scam.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"382\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Scam-5.png\" alt=\"\" class=\"wp-image-10020\" style=\"width:678px;height:363px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-5.png 713w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-Scam-5-300x161.png 300w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong><span style=\"color:#003b5c\" class=\"has-inline-color\">Figure 3:<\/span><\/strong> Extract of the WHOIS (ownership) record for the fraudulent domain, showing that it was registered on April 25 (the same day on which the SMS was received), and using a privacy-protection service provider<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Actions for brand owners: Detection and enforcement\u2014and how CSC can help<\/strong><\/h3>\n\n\n\n<p>CSC works with a number of brands to guard against this type of scam using advanced detection capabilities to provide early warning of active campaigns, and a range of enforcement options to ensure rapid takedown. This provides protection for customers and mitigates reputational damage and financial losses for the brand owner.<\/p>\n\n\n\n<p>Fraudulent content can be identified in a number of ways. With a \u201cclassic\u201d brand detection service, fake sites are found through internet metasearching or domain-name monitoring using zone-file analysis. For those organizations where phishing is a particular issue, a dedicated anti-fraud service can make use of a range of additional phishing detection techniques to maximise the likelihood of early detection. This may involve the use of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Spam traps and honeypots to intercept a cross section of spam emails with a view to identifying phishing emails<\/li>\n\n\n\n<li>Analysis of customers\u2019 webserver logs to identify instances when fake sites draw content from, or redirect to, official sites<\/li>\n\n\n\n<li>Accepting feeds from dedicated mailboxes where customers can report scams<\/li>\n<\/ul>\n\n\n\n<p>All of this content feeds into CSC\u2019s phishing correlation engine, which automatically analyzes URL patterns and site content using machine learning to match candidate sites against previously established predictors of fraudulent content.<\/p>\n\n\n\n<p>Having identified that a scam is active, the next step is rapid takedown. CSC can work with registrars and hosting providers\u2014many of whom will accept proof of fraudulent activity as a contravention of their terms and conditions, and thus grounds for takedown\u2014in addition to other industry bodies to ensure that a fake site is suspended. In other cases, it may be appropriate to work with providers to deactivate the source of the communications (i.e., the sender\u2019s email address or originating telephone number), or to have the site blacklisted in online databases.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>We\u2019re ready to talk<\/strong><\/h3>\n\n\n\n<p>If you\u2019d like to find out more about CSC\u2019s anti-fraud services, please complete a <a href=\"https:\/\/www.cscdbs.com\/en\/contact-us\/\">contact form<\/a>, and one of our expert team members will call you to discuss.<\/p>\n\n\n\n<p><a href=\"#_ftnref1\">[1]<\/a> <a href=\"https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q2_2020.pdf\">docs.apwg.org\/\/reports\/apwg_trends_report_q2_2020.pdf<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref2\">[2]<\/a> <a href=\"https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/\">statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref3\">[3]<\/a> <a href=\"https:\/\/www.statista.com\/statistics\/1149241\/share-organizations-worldwide-phishing-attack\/\">statista.com\/statistics\/1149241\/share-organizations-worldwide-phishing-attack\/<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref4\">[4]<\/a> <a href=\"https:\/\/www.itpro.co.uk\/security\/359176\/645-increase-in-royal-mail-related-phishing-scams\">itpro.co.uk\/security\/359176\/645-increase-in-royal-mail-related-phishing-scams<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref5\">[5]<\/a> <a href=\"https:\/\/www.lancs.live\/incoming\/dangerous-text-scams-bank-smishing-20400193\">lancs.live\/incoming\/dangerous-text-scams-bank-smishing-20400193<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-admin\/post.php?post=10014&amp;action=edit#_ftnref1\">[6]<\/a><a href=\"https:\/\/newgtlds.icann.org\/en\/program-status\/delegated-strings\">newgtlds.icann.org\/en\/program-status\/delegated-strings<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,521],"tags":[],"class_list":["post-10014","post","type-post","status-publish","format-standard","hentry","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing Scams: How to Spot Them and Stop Them | CSC<\/title>\n<meta name=\"description\" content=\"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Scams: How to Spot Them and Stop Them | CSC\" \/>\n<meta property=\"og:description\" content=\"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-26T14:20:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T15:05:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Phishing Scams: How to Spot Them and Stop Them\",\"datePublished\":\"2021-05-26T14:20:08+00:00\",\"dateModified\":\"2026-01-15T15:05:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/\"},\"wordCount\":1506,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Phishing-scams-1024x536.jpg\",\"articleSection\":[\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/\",\"name\":\"Phishing Scams: How to Spot Them and Stop Them | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Phishing-scams-1024x536.jpg\",\"datePublished\":\"2021-05-26T14:20:08+00:00\",\"dateModified\":\"2026-01-15T15:05:59+00:00\",\"description\":\"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/05\\\/Phishing-scams.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/05\\\/Phishing-scams.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/phishing-scams-how-to-spot-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Scams: How to Spot Them and Stop Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Scams: How to Spot Them and Stop Them | CSC","description":"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Scams: How to Spot Them and Stop Them | CSC","og_description":"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.","og_url":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2021-05-26T14:20:08+00:00","article_modified_time":"2026-01-15T15:05:59+00:00","og_image":[{"url":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Phishing Scams: How to Spot Them and Stop Them","datePublished":"2021-05-26T14:20:08+00:00","dateModified":"2026-01-15T15:05:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/"},"wordCount":1506,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg","articleSection":["Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/","url":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/","name":"Phishing Scams: How to Spot Them and Stop Them | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-scams-1024x536.jpg","datePublished":"2021-05-26T14:20:08+00:00","dateModified":"2026-01-15T15:05:59+00:00","description":"The COVID pandemic has provided many additional opportunities to fraudsters through the increased use of online channels by individuals working from home during lockdown. COVID-related lures encourage users seeking information, reassurance, and assistance to click on links.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Phishing-scams.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/phishing-scams-how-to-spot-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing Scams: How to Spot Them and Stop Them"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=10014"}],"version-history":[{"count":9,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10014\/revisions"}],"predecessor-version":[{"id":14777,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10014\/revisions\/14777"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=10014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=10014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=10014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}