{"id":7135,"date":"2021-06-23T10:27:00","date_gmt":"2021-06-23T08:27:00","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=7135"},"modified":"2021-08-17T15:10:22","modified_gmt":"2021-08-17T13:10:22","slug":"what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail\/","title":{"rendered":"What is a phishing e-mail and how can you recognise it?"},"content":{"rendered":"<p>No doubt you have already received an e-mail in which a company or a bank asks you to pay an outstanding invoice of which you are completely unaware. This is a classic example of a <strong>phishing<\/strong> attempt. And the (fake) company or bank uses this technique to get hold of your money or personal details. Falling prey to phishing scams can have serious financial consequences and compromise your cybersecurity. That is why we have compiled a list of the main tips you should know to recognise phishing attempts in time.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What is phishing? How does it work?<\/h2>\n<p>Phishing is a scam where somebody tries to steal certain information from you over the Internet.<\/p>\n<p>The attacker pretends to be a trustworthy entity, sometimes even someone you know, attempting to gain your trust.&nbsp;Therefore, the fake e-mail he sends you looks authentic; usually it even includes the logo of the real company he pretends to work for (your bank, a web store where you regularly shop\u2026).<\/p>\n<p>In such a fake e-mail, the phisher will often tell you that you need to log in to settle an outstanding balance or to win a prize. In order to do this, he will ask you to click on a link, which will lead you to a fake website. There, the phisher will ask you to enter your details or make a payment. And that is how a phisher will get hold of your details or money without you even noticing!<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p class=\"has-blue-faded-background-color has-background\">The term 'phishing' was first used in 1996, when hackers tried to steal passwords from America Online (now AOL) users. They compared this technique to that used in fishing, as they used their fake e-mails to cast lines into the 'sea' of Internet users. And just like when fishing for fish, it only takes a few people to take the bait for a phishing attack to be successful.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Basically, cybercriminals increasingly make use of phishing techniques <strong>because it is much easier to get people to click on a link than breaking into their computers.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__outer-wrap uagb-inline_notice__align-left uagb-block-e9888ec6\">\n<p class=\"uagb-notice-title\"><strong>Important:<\/strong><\/p>\n<div class=\"uagb-notice-text\">\n<p>Incidentally, cybercriminals misuse virtually any means of telecommunication to launch their attacks (telephone, text message, social media, e-mail\u2026). In this article, we will focus on e-mail, which is the most common method, but be wary of other means of telecommunication as well!<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">How do I recognise a phishing e-mail?<\/h2>\n<p>Unfortunately, phishing e-mails are increasingly harder to spot. Often, they are exact duplicates of the e-mails you receive from legitimate companies, including the logo and all. And whereas previously you could effortlessly spot phishing e-mails just by looking at the poor English, it has now become quite a difficult task because of the improved language. But although it is difficult to recognise phishing attempts, you cannot miss them if you follow the five tips below that will help you recognise and prevent them.<\/p>\n<ul>\n<li><strong>Make sure to check the e-mail address of the sender, and not just the name.<\/strong> In many cases, the domain name will not match the official domain name of the counterfeit organisation.<\/li>\n<li><strong>Check if the content of the e-mail is spelled correctly.<\/strong> Cybercriminals are often bad at spelling. As mentioned above, phishing e-mails are often written a bit better, but the slightest mistake should be enough to make you realise that you are dealing with a suspicious e-mail.<\/li>\n<li><strong>Do not click on unknown links.<\/strong> Instead, when opening an e-mail on a computer, hover your cursor over the link. This way, the link will show the destination URL. If this URL looks strange or does not match the actual website of the organisation that supposedly sent the e-mail, it is better not to click on it.<\/li>\n<li><strong>Do not download images or files contained in suspicious e-mails.<\/strong><\/li>\n<li><strong>You should never enter your username or password on a website<\/strong> without making sure it is an official page!<\/li>\n<\/ul>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h5 class=\"wp-block-heading\">The sender: often a first sign of phishing<\/h5>\n<p>Cybercriminals use different techniques to fool you. In the first place, they use a <strong>fake sender address<\/strong>. This technique, called \u2018spoofing\u2019, is super simple. Anyone can indeed enter a fake sender name in an e-mail client.<\/p>\n<p>There is no infallible way to find out who the real sender of an e-mail is. However, the route the e-mail took to arrive can provide you with an indication of the sender. You can find this route by having your e-mail client <strong>show all headers<\/strong> (please see our instructions for <a href=\"https:\/\/support.combell.com\/en\/where-can-i-find-e-mail-headers-in-thunderbird\/226\" target=\"_blank\" rel=\"noopener noreferrer\">Thunderbird<\/a>, <a href=\"https:\/\/support.combell.com\/en\/search?s=headers+outlook\" target=\"_blank\" rel=\"noopener noreferrer\">Outlook<\/a>, <a href=\"https:\/\/support.combell.com\/en\/where-can-i-find-e-mail-headers-in-mac-mail\/220\" target=\"_blank\" rel=\"noopener noreferrer\">MacMail<\/a>\u2026).<\/p>\n<p>You can also help <a href=\"https:\/\/support.combell.com\/en\/what-is-email-spoofing-how-can-i-prevent-mailspoofing-wi-my-domain-name\/507\" target=\"_blank\" rel=\"noopener noreferrer\">by making sure that others cannot spoof your e-mail address<\/a>. For this, you need to create an SPF record on your domain (please see: <a href=\"https:\/\/support.combell.com\/en\/what-is-an-spf-record-how-do-i-create-it\/77\" target=\"_blank\" rel=\"noopener noreferrer\">creating an SPF record<\/a>).<\/p>\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1143\" height=\"512\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Create-an-SPF-record-make-sure-that-others-cannot-spoof-your-e-mail-address.png\" alt=\"Create an SPF record - make sure that others cannot spoof your e-mail address\" class=\"wp-image-9319\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Create-an-SPF-record-make-sure-that-others-cannot-spoof-your-e-mail-address.png 1143w, https:\/\/www.combell.com\/en\/blog\/files\/Create-an-SPF-record-make-sure-that-others-cannot-spoof-your-e-mail-address-300x134.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Create-an-SPF-record-make-sure-that-others-cannot-spoof-your-e-mail-address-1024x459.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/Create-an-SPF-record-make-sure-that-others-cannot-spoof-your-e-mail-address-768x344.png 768w\" sizes=\"(max-width: 1143px) 100vw, 1143px\" \/><\/figure>\n<p>Even if you are protected against spoofing, it is always better to check the sender. Not every phisher uses spoofing techniques, so be sure to remove messages with a suspicious sender first.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h5 class=\"wp-block-heading\">The link in the e-mail gives away a lot of information<\/h5>\n<p>Usually, the link included in a phishing e-mail is also perfectly hidden. Behind a seemingly harmless \u2018click here\u2019 button, the attacker can easily include the address of his bogus website. And even if a URL in mentioned in the text, the web address behind the link can be totally different. Even if the text says www.mycompany.be, for example, the link can still point to another address.<\/p>\n<ul>\n<li><strong>If you are working on your desktop computer, activate your status bar (View&gt;Status Bar) in your e-mail client or web browser.<\/strong> Hover your cursor over the link, and you will now see the address in the status bar. Or right click on the link and copy\/paste from your clipboard so that you can examine it.<\/li>\n<li><strong>If you are checking your e-mail on your iPad or iPhone, long tap the link.<\/strong> A pop-up menu will reveal the real address.<\/li>\n<li><strong>Analyse and try to understand the link structure.<\/strong> The real web address to which you are redirected consists of the domain name plus an extension (.be, .com, .biz, .shop\u2026), which are located right before the first slash (\/). So, do not be fooled by an address such as \u2018https:\/\/postbank.be.fraud.com\/login\u2019, where fraud.com is the actual (fraudulent) web address, not postbank.be!<\/li>\n<li><strong>Also, be careful with \u2018homographic spoofing\u2019<\/strong>, a technique whereby certain letters in a domain name are replaced by visually indistinguishable characters. The letter O, for instance, may be replaced by a 0 (zero), an i by a !, an I (capital i) by an l (small l) . Wikipedia will provide you with further information on <a href=\"https:\/\/en.wikipedia.org\/wiki\/IDN_homograph_attack\" target=\"_blank\" rel=\"noopener\">homograph attacks<\/a>.<\/li>\n<li><strong>Be very careful with <a href=\"https:\/\/en.wikipedia.org\/wiki\/URL_shortening\" target=\"_blank\" rel=\"noopener\">URL shorteners<\/a> such as t.co or goo.gl. <\/strong>Just assume that there is no legitimate reason for shortening a URL in an e-mail!<\/li>\n<li><strong>And, last but not least: in case of doubt, you should enter the address of your bank, web store, etc. yourself.<\/strong><\/li>\n<\/ul>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What is the purpose of a phishing e-mail?<\/h2>\n<p>The attacker\u2019s intention is to <strong>steal your confidential information (login, password, bank details\u2026) or infect your computer with malware (spyware, keylogger, ransomware\u2026)<\/strong>.<\/p>\n<figure class=\"wp-block-image alignwide size-full is-style-devplus-image-rounded-shadow\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"420\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/What-is-phishing-and-how-do-you-recognise-it.jpg\" alt=\"What-is-phishing-and-how-do-you-recognise-it\" class=\"wp-image-9318\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/What-is-phishing-and-how-do-you-recognise-it.jpg 1200w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-phishing-and-how-do-you-recognise-it-300x105.jpg 300w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-phishing-and-how-do-you-recognise-it-1024x358.jpg 1024w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-phishing-and-how-do-you-recognise-it-768x269.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>The e-mail may contain an attachment that you will open without a second thought. Or it may include a link, which redirects you to the fraudulent website of the company, where you will enter your login details without any suspicion.<\/p>\n<p>If you enter your personal details on such a fake website or control panel, the cybercriminal will be able to use them to access your online banking accounts, make purchases, etc. Your identity can also be used to commit fraudulent acts or scams, whereby the cybercriminal pretends to be you. In the case of the Combell phishing e-mail, the attacker would have been able to use your login details to log in to the My Combell control panel and access databases containing information about your users.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Why are you the target of a phishing e-mail?<\/h2>\n<p>The fact that you received a phishing mail does not mean the attacker got hold of your personal details by hacking the company of which he is misusing the name.<\/p>\n<p><strong>Attackers use all sorts of tricks to get hold of e-mail addresses of potential victims<\/strong>. Consider, for example, the publicly available Whois details related to <a href=\"https:\/\/www.combell.com\/en\/domain-names\">domain names<\/a>, the names and contact details of collaborators that are included on a company\u2019s website, social media, etc. The Internet provides an astounding amount of personal information about many people, which is a real shame according to an increasing number of users!<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The fact that you received a phishing mail does not mean the attacker got hold of your personal details by hacking the company of which he is misusing the name.<\/p>\n<\/blockquote>\n<p>A company like Combell can thus also be at the centre of a phishing scam. In the past, alert customers have already reported <a href=\"https:\/\/www.combell.com\/en\/blog\/fake-combell-emails\/\">cases of fake e-mails that invited them to log in to a very convincing imitation of the My Combell login panel<\/a>. And those who logged in to it unknowingly provided their login details (username and password) to a cybercriminal.<\/p>\n<p>And yet, Combell was not hacked: all the cybercriminal had to do to contact customers was to look up the Whois information that is publicly available for every domain name. This means he did not need to access our data \u2013 which are, incidentally, optimally protected.<\/p>\n<p>Of course, we always take immediate action in cases of phishing scams in order to stop any phishing attempts. If we become the target of any future phishing attacks, you will certainly read about it on our blog, on our <a href=\"https:\/\/www.facebook.com\/CombellGroup\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook page<\/a>&nbsp;or on&nbsp;<a href=\"https:\/\/twitter.com\/combell\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>.<\/p>\n<p>However, e-mails are often sent to randomly generated addresses. You most probably already received a phishing e-mail from bank XYZ, with which you do not even have an account\u2026 However, we strongly recommend that you report any phishing attempt to the company whose name has been misused, and to <a href=\"https:\/\/www.safeonweb.be\/nl\/nuttige-links\" target=\"_blank\" rel=\"noopener noreferrer\">SafeOnWeb<\/a>.<\/p>\n<p>It is, of course, possible that some personal information comes from companies that have been hacked. You can check for yourself whether your personal details were ever accessed in a data breach by visiting the website '<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Have I Been Pwned<\/a>'?<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__outer-wrap uagb-inline_notice__align-left uagb-block-99857c8a\">\n<p class=\"uagb-notice-title\"><strong>Read more:<\/strong><\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/fallen-into-a-phishing-trap-this-is-how-you-can-limit-the-damage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fallen into a phishing trap? This is how you can limit the damage.<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Frequently asked questions<\/h3>\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-7c591847 uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-false uagb-faq-inactive-other-true uagb-faq-equal-height\" data-faqtoggle=\"true\" role=\"tablist\"><script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"@id\":\"https:\/\/www.combell.com\/en\/blog\/what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail\/\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is phishing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Phishing is a form of cybercrime in which the criminal tries to get hold of your personal details by pretending to be an official organisation, such as a company (public or private) or a bank. The phisher tricks you into clicking on a link contained in a fake 'official' e-mail that leads you to a login page where you are then requested to enter your login details. Phishing attacks can also be carried out by telephone or text message.\"}},{\"@type\":\"Question\",\"name\":\"What are the most common forms of phishing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A phisher can operate using the phone, e-mail, text messages, Whatsapp and even apps. So make sure you never give out your personal details over the phone; official organisations will never ask you to do that.\"}},{\"@type\":\"Question\",\"name\":\"Where does the name 'phishing' come from?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The term 'phishing' comes from the analogy with fishing. Just like fishers, cybercriminals cast several lines (e.g. via e-mail) to catch their prey. And only a few recipients must take the bait in order for the phishing attack to be successful.\"}},{\"@type\":\"Question\",\"name\":\"I have fallen victim to a phishing attack. What do I do now?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"If you suspect that you have shared a password with a phisher, you should change it immediately. If you use the 'phished' password elsewhere, change it there too.&lt;br>&lt;br>If you have provided your credit card or bank details, notify Card Stop and your bank immediately. For Card Stop, call 070 344 344 \u2013 the procedure can be found on the &lt;a href=\\\"https:\/\/www.cardstop.be\/nl\/home.html#\\\">Card Stop website&lt;\/a>. You should also contact your bank immediately, so that they can block your account or certain transfers if necessary.&lt;br>&lt;br>If you notice that money has been stolen from your bank account, you should &lt;a href=\\\"https:\/\/www.safeonweb.be\/nl\/een-aangifte-doen-bij-de-politie\\\">report this to the police&lt;\/a>.&lt;br>Also, be sure to forward the suspicious message you clicked on to suspicious@safeonweb.be. This way, you can prevent other people from experiencing the same situation.\"}},{\"@type\":\"Question\",\"name\":\"How can I report a phishing attempt?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"When you receive suspicious messages, forward them to suspicious@safeonweb.be (the same applies to text messages). More information can be found on the &lt;a href=\\\"https:\/\/www.safeonweb.be\/en\/what-suspicioussafeonwebbe\\\">Safe On Web website&lt;\/a>.\"}}]}<\/script><\/p>\n<div class=\"uagb-faq__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-block-e66bd830\">\n<div class=\"uagb-faq-child__wrapper\">\n<div class=\"uagb-faq-item\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">What is phishing?<\/h4>\n<\/div>\n<div class=\"uagb-faq-content\"><span><\/p>\n<p>Phishing is a form of cybercrime in which the criminal tries to get hold of your personal details by pretending to be an official organisation, such as a company (public or private) or a bank. The phisher tricks you into clicking on a link contained in a fake 'official' e-mail that leads you to a login page where you are then requested to enter your login details. Phishing attacks can also be carried out by telephone or text message.<\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-block-e68951b2\">\n<div class=\"uagb-faq-child__wrapper\">\n<div class=\"uagb-faq-item\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">What are the most common forms of phishing?<\/h4>\n<\/div>\n<div class=\"uagb-faq-content\"><span><\/p>\n<p>A phisher can operate using the phone, e-mail, text messages, Whatsapp and even apps. So make sure you never give out your personal details over the phone; official organisations will never ask you to do that.<\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-block-8a8489e1\">\n<div class=\"uagb-faq-child__wrapper\">\n<div class=\"uagb-faq-item\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">Where does the name 'phishing' come from?<\/h4>\n<\/div>\n<div class=\"uagb-faq-content\"><span><\/p>\n<p>The term 'phishing' comes from the analogy with fishing. Just like fishers, cybercriminals cast several lines (e.g. via e-mail) to catch their prey. And only a few recipients must take the bait in order for the phishing attack to be successful.<\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-block-777b0949\">\n<div class=\"uagb-faq-child__wrapper\">\n<div class=\"uagb-faq-item\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">I have fallen victim to a phishing attack. What do I do now?<\/h4>\n<\/div>\n<div class=\"uagb-faq-content\"><span><\/p>\n<p>If you suspect that you have shared a password with a phisher, you should change it immediately. If you use the 'phished' password elsewhere, change it there too.<\/p>\n<p>If you have provided your credit card or bank details, notify Card Stop and your bank immediately. For Card Stop, call 070 344 344 \u2013 the procedure can be found on the <a href=\"https:\/\/www.cardstop.be\/nl\/home.html#\" target=\"_blank\" rel=\"noopener\">Card Stop website<\/a>. You should also contact your bank immediately, so that they can block your account or certain transfers if necessary.<\/p>\n<p>If you notice that money has been stolen from your bank account, you should <a href=\"https:\/\/www.safeonweb.be\/nl\/een-aangifte-doen-bij-de-politie\" target=\"_blank\" rel=\"noopener\">report this to the police<\/a>.<br \/>Also, be sure to forward the suspicious message you clicked on to suspicious@safeonweb.be. This way, you can prevent other people from experiencing the same situation.<\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-block-f2d09dbe\">\n<div class=\"uagb-faq-child__wrapper\">\n<div class=\"uagb-faq-item\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">How can I report a phishing attempt?<\/h4>\n<\/div>\n<div class=\"uagb-faq-content\"><span><\/p>\n<p>When you receive suspicious messages, forward them to suspicious@safeonweb.be (the same applies to text messages). More information can be found on the <a href=\"https:\/\/www.safeonweb.be\/en\/what-suspicioussafeonwebbe\" target=\"_blank\" rel=\"noopener\">Safe On Web website<\/a>.<\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals increasingly make use of phishing e-mail because it is much easier to get people to click on a link than breaking into their computers.<\/p>\n","protected":false},"author":1,"featured_media":7748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62,61],"tags":[1125,41],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/Phishing-1200x420-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Combell","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/blogadmin\/"},"uagb_comment_info":3,"uagb_excerpt":"Cybercriminals increasingly make use of phishing e-mail because it is much easier to get people to click on a link than breaking into their computers.","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7135"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7135"}],"version-history":[{"count":9,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7135\/revisions"}],"predecessor-version":[{"id":11796,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7135\/revisions\/11796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/7748"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}