{"id":9483,"date":"2022-07-19T13:44:09","date_gmt":"2022-07-19T13:44:09","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=9483"},"modified":"2025-07-09T01:31:27","modified_gmt":"2025-07-09T01:31:27","slug":"phishing-top-5-signs","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/phishing-top-5-signs\/","title":{"rendered":"&#8220;Your Account Has Been Locked&#8221;: Top 5 Signs of a Phishing Scam"},"content":{"rendered":"<p style=\"text-align: justify\">The topic of our article will be how to understand that you have become a victim <a href=\"https:\/\/gridinsoft.com\/phishing\">of a phishing attack<\/a>. Below, you will learn what is discussed in our main slogan. You&#8217;re probably surprised by the name, and maybe not. But in any case, we will give <strong>a clear definition of phishing attacks<\/strong> and further consider the top most common signs of their manifestation.<\/p>\n<p style=\"text-align: justify\">What is a phishing scam? It is an attack carried out by an attacker on a user using <a href=\"https:\/\/gridinsoft.com\/social-engineering\">a form of social engineering<\/a>. It often occurs <strong>through emails, text messages, and calls<\/strong> with a specific structure and a fraudulent motive through which the fraudster attempts to influence the victim and get what he wants. The list of desires includes passwords, account data, and malware distribution. <\/p>\n<p style=\"text-align: justify\"><strong>Related Content:<\/strong> <a href=\"https:\/\/gridinsoft.com\/blogs\/qr-code-phishing-attack\/\">QR code phishing<\/a> is a growing cybersecurity threat.<\/p>\n<p style=\"text-align: justify\">You will likely notice similar emails in your inbox if you are sensitive to your privacy. At the bottom, there is often a requirement <strong>to urgently click on a link<\/strong> or a confirmation to enter the system, which you did not open soon. So, what to do if you fall for a <a href=\"https:\/\/gridinsoft.com\/blogs\/recognize-and-avoid-phishing-scams\/\">phishing scam<\/a>? <\/p>\n<h2 style=\"text-align: center\">Five signs of a phishing scam<\/h2>\n<p style=\"text-align: justify\">Below we will submit the five most common signs <a href=\"https:\/\/gridinsoft.com\/blogs\/top-12-types-of-phishing-attacks-facts-you-should-to-know\/\">of the phishing scam<\/a>, after which you will be able to protect yourself from such deception. It is very important to be able to define it correctly, as threat actors apply very sly tactics. In the case of spear phishing, for example, they can <strong>counterfeit the email<\/strong> you are waiting for &#8211; and make you trust them.<\/p>\n<h3 style=\"text-align: center\">1. Identity verification in your email<\/h3>\n<p style=\"text-align: justify\">Everyone saw it at least one time in their life. Each user has an account &#8211; in a bank, online store, or social network, which is tied to an email. Based on this, <strong>scammers use this as bait<\/strong> to make a successful phishing attack on the user.<\/p>\n<figure id=\"attachment_9491\" aria-describedby=\"caption-attachment-9491\" style=\"width: 769px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-verification-email.png\" alt=\"Verify identity email scam\" width=\"769\" height=\"442\" class=\"size-full wp-image-9491\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-verification-email.png 769w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-verification-email-300x172.png 300w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><figcaption id=\"caption-attachment-9491\" class=\"wp-caption-text\">The example of identity verification email scam<\/figcaption><\/figure>\n<p style=\"text-align: justify\"><a href=\"https:\/\/gridinsoft.com\/blogs\/pretexting-in-cybersecurity\/\">They disguise their messages<\/a> as a company or bank that you know that says they need <strong>to urgently confirm your identity<\/strong> to do some background check or something. In this case, you need to be very attentive and understand whether you were waiting for some message from your company or bank which may relate to your account. If you doubt the legitimacy of such confirmation, better enter the account from your application or the official website, bank, or company and check the presence of any such issues.<\/p>\n<h3 style=\"text-align: center\">2. Addresses or links to a website do not look authentic<\/h3>\n<p style=\"text-align: justify\">Fraudsters carefully approach the issue of falsifying addresses under the actual addresses of some offices. At first glance, these addresses may seem quite similar to the ones banks or companies use to text you. But if you look closely, you can understand that something is wrong with the name. The addresses look similar but are never the same as the official sender has.<\/p>\n<figure id=\"attachment_9492\" aria-describedby=\"caption-attachment-9492\" style=\"width: 864px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/geeksquad-fraud-email.png\" alt=\"Missing correct email\" width=\"864\" height=\"478\" class=\"size-full wp-image-9492\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/geeksquad-fraud-email.png 864w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/geeksquad-fraud-email-300x166.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/geeksquad-fraud-email-768x425.png 768w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><figcaption id=\"caption-attachment-9492\" class=\"wp-caption-text\">The sender&#8217;s email is not even similar to the real Geek Squad support&#8217;s one<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Information in letters can also be malicious. For example, <a href=\"https:\/\/gridinsoft.com\/malware\">this malicious stuff<\/a> can be in the links inside the message body. Clicking on them will take you to a malicious site where you&#8217;ll likely see <strong>a phishing form, or a malicious offer<\/strong>. To avoid this, hover over them and check the link&#8217;s current address.<\/p>\n<h3 style=\"text-align: center\">3. Poor spelling and illiteracy of the writing itself<\/h3>\n<p style=\"text-align: justify\">Read the letter carefully before agreeing to anything you see or read. The presence of gross grammatical and spelling errors should give you an idea of the legitimacy of this letter. Major sites, stores, banks, and companies <strong>will protect their reputations and avoid minor missteps<\/strong>. It is their image in the customers&#8217; eyes, so they are interested in taking care of their visuals.<\/p>\n<figure id=\"attachment_9493\" aria-describedby=\"caption-attachment-9493\" style=\"width: 1081px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-email-kaspersky.png\" alt=\"Fake email poor grammar\" width=\"1081\" height=\"706\" class=\"size-full wp-image-9493\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-email-kaspersky.png 1081w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-email-kaspersky-300x196.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-email-kaspersky-1024x669.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/fake-email-kaspersky-768x502.png 768w\" sizes=\"auto, (max-width: 1081px) 100vw, 1081px\" \/><figcaption id=\"caption-attachment-9493\" class=\"wp-caption-text\">Poor grammar in the email is a sign of a counterfeit<\/figcaption><\/figure>\n<p style=\"text-align: justify\">Read carefully everything you see, and look at the structure, whether there is a greeting, the central part, and a logical ending. That way, you can determine if the letter is genuine.<\/p>\n<h3 style=\"text-align: center\">4. Suspicious attachment<\/h3>\n<p style=\"text-align: justify\">If you have received an email with an attachment you will be asked to go to, you should check it well. Scanning the attached file with the antivirus is a good idea. At least, you should be on the alarm when seeing the offer to enable macros in the document. Through such attachments, fraudsters often try to distribute malicious URLs that lead to the installation of Trojans and malware on your device.<\/p>\n<figure id=\"attachment_9495\" aria-describedby=\"caption-attachment-9495\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/email-spam.png\" alt=\"Malicious attachment email\" width=\"810\" height=\"361\" class=\"size-full wp-image-9495\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/email-spam.png 810w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/email-spam-300x134.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/email-spam-768x342.png 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><figcaption id=\"caption-attachment-9495\" class=\"wp-caption-text\">Malicious attachment in this message contains spyware<\/figcaption><\/figure>\n<h3 style=\"text-align: center\">5. The purpose of the phishing message is to make you panic.<\/h3>\n<p style=\"text-align: justify\">Here we return to our main slogan of the article &#8211; <strong>&#8220;Your account is blocked&#8221;<\/strong>. Yes, this is also one of the features <a href=\"https:\/\/howtofix.guide\/microsoft-office-365-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">of phishing scams<\/a>. Malefactors use such phrases to drive users into a panic. It is a psychological technique so that the user does not have time to think clearly. In a panic, you go to the link or enter the info to the attached form, and thereby compromise their data.<\/p>\n<figure id=\"attachment_9496\" aria-describedby=\"caption-attachment-9496\" style=\"width: 952px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/extortion-letter.png\" alt=\"I hacked you spam\" width=\"952\" height=\"878\" class=\"size-full wp-image-9496\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/extortion-letter.png 952w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/extortion-letter-300x277.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/extortion-letter-768x708.png 768w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\" \/><figcaption id=\"caption-attachment-9496\" class=\"wp-caption-text\">The classic extortion letter that tries to scare the victim<\/figcaption><\/figure>\n<p style=\"text-align: justify\">They can add a list of frightening phrases &#8211; <strong>&#8220;your computer is infected,&#8221; &#8220;we leaked your data&#8221;<\/strong>, and others like that. To verify that these threats are real, log in to your accounts through official sources, not through the ones you see in a letter. Since there could be real cases of such notifications, you should verify the authenticity of such threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The topic of our article will be how to understand that you have become a victim of a phishing attack. Below, you will learn what is discussed in our main slogan. You&#8217;re probably surprised by the name, and maybe not. But in any case, we will give a clear definition of phishing attacks and further [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9544,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4,1549],"tags":[701,131,674,681],"class_list":{"0":"post-9483","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"category-troubleshooting","9":"tag-email-spoofing","10":"tag-phishing","11":"tag-phishing-scams","12":"tag-spam-email"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/07\/phishing.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/9483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=9483"}],"version-history":[{"count":10,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/9483\/revisions"}],"predecessor-version":[{"id":11942,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/9483\/revisions\/11942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/9544"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=9483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=9483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=9483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}