Learn how to spot if it's a phishing email. Be risk aware, here's a step-by-step guide on how a hacker does a phishing email
Stages of Phishing Email:
Hacker targets the company or person. Using social media networks or other internet sites, he finds employees with access to company data/systems.
Following the social media trail, he identifies other people the employee may know. They are your friends and close friends.
A fake but recognizable email address is created to impersonate an organization, a colleague or boss.
The hacker now sends the email using legitimate channels such as Yahoo and Gmail. Phishing emails will usually address their emails in general terms, they won't personalise it to you.
The email passes the spam filter and arrives at the employee's inbox looking like it came from an organization they’re trying to fraud.
Normally, a common person wouldn’t really know how to determine a real one from a fake e-mail. Feeling like they know the source, they will of course open and read through it.
The link or attachment will be clicked or opened by person who owns the e-mail.
Some opened websites cause credentials to be stolen or a malware to be installed. These will infect the computer/smartphone or network.
The hacker uses now the backdoor to steal valuable information like bank account details.