X Close

Risky Business

Home

Tips and tricks for securing information

Menu

Cyber Security Awareness Month – Week Two (Part One)

By Daniela Cooper, on 10 October 2024

Here is Part One of Week Two’s content for Cyber Security Awareness Month. This short security related story is all about spotting fake emails. Make sure you read all the way to the end to enter our week two quiz to win a £25 Amazon voucher.

Spotting fake emails

One slow day, whilst sitting in his office, James Linton noticed something. Emails don’t show the sending email address by default. He realised he could put any name there he wanted.

So he did, for five months.

He started by pranking his colleagues. He sent them emails that looked like they were from their CEO. He loved the excitement and wanted more.

James’ first real victim was the CEO of a large British bank. James sent him an email purportedly from the bank’s chairman. Suspecting nothing, the CEO engaged in an exchange praising the chairman.

James leaked the email exchange, embarrassing the CEO and prompting the bank to reconfigure their email systems. SINON_REBORN – James’ prankster alter ego – had arrived!

The pranking spree continued.

The Governor of the Bank of England.

A British politician.

And the White House!

Sending fake emails was exhilarating. James compared the excitement of it to the high of gambling –“You fire out three emails, and one of them comes up. When it does, you realise you have one on the line.”

James’ emails worked. Over and over again.

They worked because they won his victims’ trust.

That’s exactly what targeted fake emails do.

What are fake emails?

Fake emails look like they’re from legitimate or known sources, like a person or company you know.

These days, fake emails are difficult to spot.

The idea that most fake emails come from “long-lost relatives” is a myth. Today’s fake emails are more convincing. For the most part, they’re free from spelling and grammatical errors.

Spotting_fake_emails-Image-1-eng-gb

Fake emails can be either generic or targeted.

Generic fake emails are low in complexity but high in volume. Criminals send out millions of them. They usually look like they’re from a well-known company, like Apple or Amazon.

Targeted fake emails are harder to recognise and are increasingly common. They’re unique to the recipient and usually reference information found on platforms like LinkedIn.

Pro Tip

You may have heard some people refer to fake emails as “phishing”. They’re exactly the same thing. Targeted fake emails are sometimes called “spear-phishing”.

Creating legitimate-looking fake emails isn’t as hard as you might think.

How did James Linton create fake emails?

James decided on his target first. Then he picked his character based on his target’s professional and personal connections.

The next step was to find a hook. The hook was usually an interest both James’ target and character shared.

James then created a fake email address using his character’s name.

Finally, James added extra credibility to his fake emails. For example, he might hand type a second “email” below his message. This additional text, James believed, made his emails seem as though they had been forwarded.

James also favoured adding “Sent from my iPhone” to the end of messages. This made it seem like his messages were sent by an ordinary person, not “somebody huddled over a laptop in their hoodie.”

Pro Tip

How to create legitimate-looking fake emails

A guide by James Linton:

1. Pick your target.

2. Pick your character.

3. Create a hook.

4. Create a fake email address.

5. Add extra credibility.

Ian Levy: a target too far

After tricking the White House, James’ search for worthy prey continued. That was when he landed on the Technical Director of the UK’s National Cyber Security Centre (NCSC) – Dr Ian Levy.

Posing as a colleague – the Director of Operations – James “accidentally forwarded” an email from another colleague – the Director of Communications – to Ian, including a link to an article.

Spotting_fake_emails-Image_v2-2-eng-gb_rrLYrfn

After inspecting the link on this phone (by a good old “touch-and-hold”), Ian suspected the emails were fake.

How to spot fake emails

You can use Ian Levy’s 3-step checklist:

Pro Tip

How to spot fake emails

1. Check sender’s address.

2. Check content.

3. Check links or attachments.

Step 1: Check sender’s address

Email inboxes show sender names, but they don’t always show addresses.

You can click on the sender’s name to reveal their actual email address. Pay attention to the information that comes after @.

Right after Ian had noticed the link protection of mail.com – instead of ncsc.gov.uk – he examined the sender’s address:

paul.chichester.ncsc.gov@mail.com

It didn’t look right. It was supposed to end with @gov.uk. He was intrigued, so he played along, humoring his adversary. Eventually, Ian Levy convinced James Linton to reveal his identity.

Pro Tip

Do you recognise the sender or the sender’s email address?

  • Click on the sender’s name to reveal the email address.
  • Contact the person you think the email is from – using anything but that email address.

Step 2: Check content

Fake emails use emotional manipulation to trick people. Notice the different types of emotions evoked:

Panic

Make a payment – your manager needs you to make an urgent payment.

Worry

Verify some information – someone has tried to access a company or service you rely on (such as a bank, phone provider or TV service).

Curiosity

Open an attachment – you’ve been sent a confidential document to read.

This is how James Linton attempted to trick Ian Levy. The emails “accidentally forwarded” from his colleague evoked curiosity.

Kindness

Visit a website – a colleague needs you to visit a website to check the content and provide your opinion.

Trust

Provide sensitive information – a colleague needs you to reveal sensitive information to help them with a task.

Pro Tip

Is the email unexpected? Does it convey an undue sense of urgency? Does it ask you to break policy?

  • Slow down and think.
  • Check the sender details.
  • Call the person you think the email is from and ask them. Call them using a known contact number.

Step 3: Check links or attachments

Links can be displayed in their raw format (www.google.com) or as a hyperlink (this). They can also be disguised or shortened, like this https://bit.ly/3yJanNJ.

To see the true destination of a link, hover your mouse over it.

Or, if on your phone, do what Ian did. Touch & hold the link to reveal its true destination. This is how Ian noticed the link for mail.com, instead of ncsc.gov.uk.

File extensions – the last 3 or 4 letters after the dot [.] at the end of the file – tell you what a file does. So make sure you inspect them before opening attachments.

Pro Tip

Does the email include a link or attachment you don’t recognise?

  • Hover your mouse over a link to see its true destination.
  • If you are using Google Chrome, the browser has a built-in safe browsing feature that will show a warning before taking you to a dangerous site – keep an eye out for these warning messages.
  • You could also use a reliable URL scanner to check whether or not a link is safe to open.
Bonus content: File extensions

Files ending .exe, .vbs and .scr are more likely to be dangerous. If you see a file that contains any of these extensions, especially if what you think you are opening is meant to be a read only file, such as a document, photo or video, be cautious.

Enable “Show file extensions” on your computer as it allows you to check file types before opening them.

Make sure the file you think you’re opening is what it claims to be:

  • PDF – .pdf .fdf .xfdf
  • MS Word – .docx .doc
  • MS PowerPoint – .pptx .ppt
  • MS Excel – .xlsx .xls
  • Image – .jpeg .jpg .jp2 .jpx .png .gif .tif .tiff
  • Video – .avi .flv .wmv .mov .mp4

Can you spot fake emails?

Below are four emails – see if you can spot the fake ones.

Email2-side2
Real or fake?

Fake!

Check links or attachments.

Hovering over “Open in Docs” shows you its true destination, a look-alike link – http://drive—google.com/samandrews/fdhh9w8qr5lioe55.

 

Email1-side2
Real or fake?

Real!

This is a legitimate Dropbox email.

Check the sender’s address.

The sender is “dropboxmail.com” – although this looks unusual, a quick search reveals it’s legitimate.

Check links or attachments.

The link is to a secure site https://www.dropbox.com.

 

Email3-side2
Real or fake?

Fake!

Check links or attachments.

Hovering over “this” shows you the link’s true destination – a look-alike website address https://drive.google.com.download-photo.balootec.net/AONhfnfeuG. The real address is “balootec.net” which is disguised to look like Google Drive.

Check the sender’s address.

Do you know AK? Clicking on the sender’s name reveals their actual email address. Does the email address “AKumar62457@gmail.com” seem familiar?

Check content.

Is the email unexpected? What emotions does it evoke? Someone addressing you as “friend” and sending you a “cute photo” likely evokes curiosity.

 

Email4-side2
Real or fake?

Fake!

Check links or attachments.

Hovering over “CHANGE PASSWORD” shows you its true destination – http://myaccount.google.com-intro.help-secruity.org/signinoptions. The link actually points to the website of “help-secruity.org”, not Google.

And “secruity” in the link is misspelled.

Check the sender’s address.

Clicking on the sender’s name reveals their actual email address. The sender address “google.support” isn’t actually used.

Check content.

The email contains poor grammar – “You’re account” and “Suspicious signon”.

 

Summary

After Ian Levy coaxed James Linton out of hiding, the pair teamed up. They co-authored a blog about their experience.

Their aim was to help people spot future fake emails.

After completing this module, you’ll have everything you need to do just that.

 

How to spot fake emails

1. Check the sender’s address. Click on the sender’s name to reveal it. Contact the person you think the email is from using a known contact number.

2. Check the content of the email. Is the email unexpected? Is it asking you to do something unusual? What emotions does it evoke?

3. Check links or attachments. Hover over them to see their true destination. If they look suspicious, search for verifiable online information.

Week Two Quiz

For the chance to win a £25 Amazon voucher answer the following question:

Q: What are the three steps to spotting a fake email?

Please send your answers to ISG via https://myservices.ucl.ac.uk/self-service/requests/new/provide_description?from=wizard&service_id=1296&service_instance_id=3679&support_domain=myservices-isg – use the subject line Cyber Security Awareness Month Quiz Entry – Week Two.

Thanks to CybSafe for providing the content for this blog post!

Leave a Reply