How To Check malicious website/URL
IMPORTANT: DO NOT click anywhere within the body of the email.
Most Phishing emails will come from an email address that you would normally trust. example firstname.lastname@example.org.
To find out who the email is REALLY from, move you mouse over the email address.
You will then see the actual email address that the email has come from.
- Right click on the email address
- Select "Copy Hyperlink"
- Open your browser and search for https://fortiguard.com/webfilter
- Paste the link into the Web filter search box and hit enter
- The result will show as the following if it’s a spam e.g. “catergory: Phishing”
If the result shows Phishing, forward the suspect email to email@example.com
Delete the email.
Suppose you check your e-mail one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do?
This message and others like it are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering.
Most people associate phishing with e-mail messages that spoof, or mimic, banks, credit card companies or other business like Amazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam.
From beginning to end, the process involves:
- Planning. Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers.
- Setup. Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addresses and a Web page.
- Attack. This is the step people are most familiar with -- the phisher sends a phoney message that appears to be from a reputable source.
- Collection. Phishers record the information victims enter into Web pages or popup windows.
Identity Theft and Fraud. The phishers use the information they've gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover.
If the phisher wants to coordinate another attack, he evaluates the successes and failures of the completed scam and begins the cycle again.
Phishing scams take advantages of software and security weaknesses on both the client and server sides. But even the most high-tech phishing scams work like old-fashioned con jobs, in which a hustler convinces his mark that he is reliable and trustworthy. Next, we'll look at the steps phishers take to convince victims that their messages are legitimate.
One simple rule.
NEVER open and attachment or click on a link from a suspicious email.
Most Phishing emails will have a notification of something dyer, such as "your account has suspended" or "your credit card has been charged....."
Check who the email is from. Make sure you know the person or the organisation who has sent the email.
If you suspect you have been subject to a Phishing scam and you maybe affected, forward the email to us at firstname.lastname@example.org