Phishing Detector from DATUREX GmbH
The DATUREX GmbH offers you free of charge a service that combines most of these points.
Simply forward a suspicious email to phishing@daturex.de further to obtain a complete analysis.
How we recognize phishing:
-
Comparison of domains used with Phishing databases updated daily
-
Scan of the domains used, do you belong to the organization ? Have they been created recently ? What is their reputation? What is the reputation of the hosting provider ?
-
Checking sent attachments using the latest technology Virus scanner
-
Assessment of all aspects by our own A.I. running on our German servers
The use of a local K.I enables us to use your data to secure maximum.
Sign here the Order processing contractso that you are on the safe side.
Recognize phishing easily
Phishing is a common type of cyberattack that involves tricking people into revealing sensitive information, such as usernames, passwords, credit card details and other personal information by faking a trusted identity in digital communications. Here are some essential guidelines to recognize phishing attempts and protect yourself from such threats:
1. check the sender's information
– Check the e-mail address: Look carefully at the sender's e-mail address, not just the display name. Phishing emails often come from addresses that have slight spelling mistakes or use famous names with extra characters.
– Examine links carefullyHover over all the links in the email without clicking on them to see the actual URL. If the URL looks suspicious or does not match the alleged source, it could be a phishing attempt.
2. pay attention to urgency or threatening language
- Phishing attempts often create a sense of urgency to provoke quick action. Be wary of emails that request urgent action to verify your account, secure your data or claim a reward.
- Watch out for threats or alarming messages warning of serious consequences if you do not act immediately.
3. analyze the content
- Grammar and spelling: Official communications from reputable companies are usually well written. Poor grammar and spelling mistakes can be warning signs.
– General salutations: Phishing e-mails often use general salutations such as "Dear customer" or "Dear user" instead of your real name. Be careful with emails that do not address you personally.
4. do not open attachments immediately
- Attachments may contain malware. Do not open any attachments that you were not expecting, especially from unsolicited e-mails. Check the credibility of the sender before opening files.
5. use security software
- Make sure you have up-to-date antivirus software that can detect and block phishing and other malicious attacks.
- Consider using email filters to help detect spam and phishing emails.
6. check whether websites are secure
- If you are redirected to a website, make sure it is secure. Look for URLs that start with `https://` and check that the domain name matches the organization's official website.
- Secure pages also display a lock symbol in the address bar.
7. be careful with requests for personal information
- Legitimate organizations will not ask for sensitive personal information via email. Always question emails that request personal or financial information.
8. use multi-factor authentication (MFA)
- Enable MFA on all accounts that support it. This adds an extra layer of security that makes it harder for attackers to gain access, even if they have your password.
9. educate yourself and others
- Stay informed about the latest phishing tactics. Cybercriminals are constantly developing new methods to exploit users.
- Share your knowledge with friends and family. The more people know about phishing, the less likely they are to fall victim to it.
10. check in case of doubt
- If an email or communication seems suspicious, verify its legitimacy by contacting the organization directly through official channels. Do not use the contact information provided in the suspicious email.
Below you will find some clear phishing indicators:
Sender email address: If an email claims to come from Fedex but the sender email address is info@fed-ex.org instead of @fedex.org, for example, this is spoofing.
Suspicious links: Some of the emails are completely identical to the original except for a single link.
This means there are links to the original website, privacy policy and co.
But one of these links leads to a criminal website that resembles the original, but whose domain does not belong to the organization. For example, paypol.de instead of paypal.de
There are emails that cannot be conclusively judged to be genuine simply by inspection. In these cases, you must ALWAYS confirm the authenticity via other channels.
This means you call the company or the supposed work colleague.
NEVER pass on login data by email.
Phishing detection through e-mail header inspection
Inspecting email headers to detect phishing attempts is a critical skill for raising your cybersecurity awareness. Email headers contain detailed information about the sender, route and creation of an email and provide insights that can help identify potential phishing attacks. Here's a step-by-step guide on how to detect phishing by examining email headers:
Step 1: Display email headers for different email clients:
https://mxtoolbox.com/Public/Content/EmailHeaders/
Step 2: Analyze the "From" field
The "From" field may show a familiar name, but the actual email address could be suspicious. Check:
- Display name and e-mail address do not matchIf the sender's name is a known contact or company, but the e-mail address is unrecognizable or filled with random characters, this is a warning signal.
- Domain nameCheck the domain name. Phishers often use domains that mimic legitimate domains by adding or omitting letters (e.g. `microsoftt.com` or `micorsoft.com`).
Step 3: Examine the "Received" lines
These are crucial for understanding the path of the email. Typically, the last "Received" line at the top shows the origin. Pay attention to:
- Original IP addressUse online tools to look up the IP address. If it comes from a suspicious location, be careful.
- ConsistencyIn a legitimate email, the domain names in the "Received" lines should logically relate to the sender or their email service. Any discrepancies could indicate a forged email.
Step 4: Check the "Return path"
This should match the sender's e-mail address in the "From" field. A different return path is a clear indication of a phishing attempt.
Step 5: Look at the "X" headers
Headers such as `X-Mailer`, `X-Originating-IP` or `X-Sender` provide information about the software used to send the email and the original IP address. Unusual values or email clients or IP addresses that do not match the alleged location of the sender are suspicious.
Step 6: Check links in the "Message ID"
The 'Message ID' should have a domain name that matches the sender's e-mail domain. A discrepancy may indicate a phishing attempt.
Step 7: Be careful with attachments
If the header analysis arouses suspicion, be extremely careful when opening attachments or clicking on links in the email, as these could contain malware or lead you to phishing sites.
Step 8: Use SPF, DKIM and DMARC data
These fields are used for e-mail authentication:
- SPF (Sender Policy Framework)Validates the IP address of the sender.
- DKIM (DomainKeys Identified Mail)Ensures that the content of the e-mail has not been manipulated.
- DMARC (Domain-based Message Authentication, Reporting & Conformance)Uses SPF and DKIM to verify authenticity.
Conclusion
Practicing these header inspection techniques regularly will improve your ability to recognize phishing emails. Always verify suspicious emails by contacting the sender through official channels. Remember, it's better to be cautious when dealing with emails that appear suspicious in any way. By staying vigilant and informed, you can significantly reduce your risk of falling victim to phishing attacks.
More blog posts
Internal vs. external reporting offices: Advantages and disadvantages at a glance
The Whistleblower Protection Act brings new challenges for companies in Germany. Since July 2023, larger companies have had to set up secure reporting channels. This regulation serves the purpose of whistleblowing and strengthens compliance management. Companies are faced with the...
External data protection officers for whistleblower reporting offices
The Whistleblower Protection Act presents companies with new challenges. It requires the establishment of internal reporting offices for whistleblowers. These offices must be independent and guarantee data protection. Many companies use external data protection officers...
Legal consequences of whistleblower reports
The new Whistleblower Protection Act (HinSchG) brings important changes for companies and employees. New rules for whistleblower reports and their legal consequences have applied since July 2023. The law strengthens the protection of whistleblowers and creates clear...
Importance of anonymity for whistleblowers and how to ensure it
The new Whistleblower Protection Act (HinSchG) brings significant changes for companies in Germany. It requires the establishment of reporting offices that process confidential information securely. Whistleblowing is thus gaining in importance and the...
Best practices for whistleblower hotlines: Tips for companies
In today's business world, whistleblower hotlines are an indispensable tool for companies. They make it possible to uncover and rectify irregularities at an early stage. Effective whistleblowing policies not only protect the integrity of the company, they also...
The role of the whistleblower reporting office: tasks and importance
The Whistleblower Protection Act (HinSchG) brings important changes for companies and organizations. It requires the establishment of internal reporting offices for violations. These offices are now the central point of contact for whistleblowing in the professional environment. The...