How to Outsmart Sophisticated Phishing Scams | Ephrata National Bank (2024)

  • Home
  • /
  • ENB Insights
  • /
  • How to Outsmart Sophisticated Phishing Scams

February 28, 2023

You’ve probably heard of phishing. But do you really know what it is – and more importantly, how to protect yourself from falling victim to it? Phishing scams have become very sophisticated, but there are some simple things you can do to protect yourself and keep your personal information safe.

What is Phishing?

Let’s start with a basic description: Phishing is a type of scam where an attacker sends a fraudulent message to trick you into revealing sensitive information – often to access your accounts or commit identity theft.

Phishing attempts usually occur through email, over the phone, or via text message. They can be very well-designed to look or sound like legitimate messages from those you know and trust, such as your financial institution, and may contain a link that directs you to a fake website that looks legitimate.

Tip #1: Do not expect phishing emails to be filtered into your Junk mail. Because they are often individually crafted based on information gathered on your social media sites, they can avoid detection from advanced email filters.

How to Detect Phishing Scams

There are ways to avoid phishing scams if you know what to look and listen for. Be on the lookout for these identifying factors:

  • Inconsistencies in email addresses. Phishing emails will typically come from an unfamiliar, unusual email address. The easiest way to detect this is to hover your cursor over the email address to reveal the true “from” address. This will usually reveal the email as a fraud and can be done without actually clicking into the email itself. For example, if an email allegedly originates from your financial institution, but the domain name reads something else, it’s likely a phishing email. Delete it immediately.
  • Unfamiliar greeting or salutation. Sometimes the informality or other irregularity of a salutation can and should provoke suspicion. Be on the lookout for this type of irregularity in emails and text messages, and perhaps even phone calls. For example, if your financial institution greets you with a nickname you don’t use with your accounts, it’s an indication of phishing.
  • Bad grammar, spelling mistakes or unusual language. Legitimate emails and text messages will not have these mistakes. However, they are often found in phishing scams.
  • Demand for urgent action. This is key! Emails, text messages and phone calls threatening some type of negative consequence, loss of money, or missed opportunity are key factors in phishing scams. The urgency prompts you to act without thinking and is what ultimately gets intelligent consumers to fall for these well-designed phishing scams. The scams have flaws, but the panic they create can cause consumers to take swift action before errors can be spotted.
  • Requests for passwords. Do not respond to a text alert, email, or phone call asking for a password, PIN, or any other security information. Never give this information to anyone, even if you think it’s your bank or credit union. They will never ask you for this information. Ever.

Tip #2: Be wary of long text numbers. If you receive a text message from an unidentified number longer than 10 digits, the odds are high it’s a scam.

More Dos and Don’ts to Protect Yourself

  • Don’t click on links in an unsolicited email or text message.
  • Don’t use the phone number a potential scammer provided in an email or text message. Look up the company’s phone number on your own and call to verify the authenticity of the message or request.
  • Don’t give out personal information such as passwords, credit card numbers, bank account numbers, dates of birth, or Social Security numbers.
  • Don’t respond to suspected phishing emails, text messages or phone calls, even if you think it would be fun to tease or trick them. It’s best to avoid responding in any way.
  • Do be suspicious of anyone pressing you to act immediately.

Tip #3: Phone numbers and caller identities can be faked to look like the caller ID is from a business you know and trust, like your financial institution. Never trust that the caller ID is accurate. It is best to look up the company’s phone number on your own and call them.

If you detect suspicious activity, contact the alleged company directly. In the case of your financial institution, call at the number listed on the back of your bank-issued debit card, in your banking app, or the bank’s official website.

Learn more about scams and ways to protect yourself by visiting zellepay.com/pay-it-safe.

Back to Insights >I Need Assistance >

How to Outsmart Sophisticated Phishing Scams | Ephrata National Bank (2024)

FAQs

How to Outsmart Sophisticated Phishing Scams | Ephrata National Bank? ›

Don't give out personal information such as passwords, credit card numbers, bank account numbers, dates of birth, or Social Security numbers. Don't respond to suspected phishing emails, text messages or phone calls, even if you think it would be fun to tease or trick them.

How to outsmart a scammer? ›

  1. Do not make any decisions in the moment. ...
  2. Hang up if you are feeling pressured. ...
  3. Do not share any personal or financial information (your social security number, checking account information, etc.). ...
  4. Ask for their name and the name of the business/organization. ...
  5. Ask for additional information to be mailed to you.

What is the key to preventing successful phishing scams? ›

The key is that you should be the one to initiate the contact, using contact information that you have verified yourself. Never provide your password over the phone or in response to an unsolicited Internet request.

What is the most sophisticated form of phishing? ›

Spear phishing

There are two other, more sophisticated, types of phishing involving email. The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim: Their name.

What do the attackers do to create a sophisticated and convincing message? ›

Attackers use information freely available on your website and social media accounts (known as your 'digital footprint') to make spear-phishing messages more convincing.

What are three excuses a scammer uses? ›

Vague profiles and excuses: Scammers frequently fabricate stories about financial trouble, illness, or other misfortunes, manipulating their victims' sympathy to solicit money. They urge their victims to send gift cards, wire transfers, or cryptocurrency.

How to snitch on a scammer? ›

How to Report Crime and Fraud
  1. Submit an anonymous tip online.
  2. Report cyber scams and incidents.
  3. Contact your local FBI field office.
  4. Contact your nearest international office.
  5. Get more FBI contact information.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

What is the most common method for a phishing attempt would be by? ›

Email phishing is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email addresses they can obtain. The email usually informs you that there has been a compromise to your account and that you need to respond immediately by clicking on a provided link.

What do most phishing attacks try to get to? ›

A phishing attack is a type of cyber attack that uses social engineering tactics to steal sensitive information from victims. Most successful attacks trick users into opening malicious links or files by appearing to come from a reputable source.

What is phishing trick? ›

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

What information do phishers want? ›

Some of the basic types of KEY information that Phishers are looking for include: Information Theft Phishers want items like your Employee ID number and Bank account numbers. In addition, they especially want credit card numbers and social security numbers.

What is a common tactic used by phishers to trick users into clicking on a link or opening an attachment? ›

They can also conduct what's known as smishing. This method leverages malicious text messages to trick users into clicking on a malicious link or handing over personal information.

How does an attacker trick a victim into thinking that they are on a legitimate site? ›

Link manipulation. Often referred to as URL hiding, this technique is used in many common types of phishing. Attackers create a malicious URL that's displayed as if it were linking to a legitimate site or webpage, but the actual link points to a malicious web resource.

What are some of the tactics cybercriminals use to try to trick their victims? ›

It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. Reformat the hard drive of your computer causing you to lose all your information. Alter or delete files. Steal sensitive information.

What are the persuasion techniques of phishing? ›

Three important findings of our research are that: (1) authority is the most popular persuasion technique regardless of the target and the reason used; (2) depending on the target types and the reason types, the next most popular persuasion principles are scarcity, consistency, and likeability; and (3) scarcity ...

What can you do against a scammer? ›

STOP CONTACT WITH THE SCAMMER.

Hang up the phone. Do not reply to emails, messages, or letters that the scammer sends. Do not make any more payments to the scammer. Beware of additional scammers who may contact you claiming they can help you get your lost money back.

How do you bring down a scammer? ›

If you spot a scam or have been scammed, report it and get help. Don't be embarrassed about reporting a scam. Because the scammers are cunning and clever there's no shame in being deceived. By reporting it, you'll make it more difficult for them to deceive others.

How to catch out a scammer? ›

The “From” name and email address don't tally. Hover over or click on the “From” name to see their email address. Scammers will often try to mask who they are by using an official name. But they can't fake their email address or phone number as easily.

Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 6406

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.