What to Do If You Receive a Phishing Attempt (2024)

Identify and react to a phishing attempt in a way that protects yourself and your colleagues.

If you suspect that an email or text message you received is aphishing attempt:

  • Do not open it.In some cases, the act of opening the phishing email may cause you to compromise the security of yourPersonally Identifiable Information (PII).
  • Delete it immediatelyto prevent yourself from accidentally opening the message in the future.
  • Do not download any attachmentsaccompanying the message. Attachments may contain malware such as viruses, worms or spyware.
  • Never click linksthat appear in the message. Links embedded within phishing messages direct you to fraudulent websites or web forms.
  • Do not replyto the sender. Ignore any requests the sender may solicit and do not call phone numbers provided in the message.
  • Report it.Help others avoid phishing attempts:

If youreceivea phone call that seems to be aphishing attempt:

  • Hang up or end the call.Be aware that area codes can be misleading. If your Caller ID displays a local area code, this does not guarantee that the caller is local.
  • Do not respond to the caller’s requests.University at Buffalo, financial institutions and legitimate companies will never call you to request yourPII.Never givePII to the incoming caller.
What to Do If You Receive a Phishing Attempt (2024)

FAQs

What to Do If You Receive a Phishing Attempt? ›

Do not open it. In some cases, the act of opening the phishing email may cause you to compromise the security of your Personally Identifiable Information (PII). Delete it immediately to prevent yourself from accidentally opening the message in the future. Do not download any attachments accompanying the message.

What should you do if you suspect a phishing attempt? ›

If you get a phishing email or message in Teams
  1. Never click any links or attachments in suspicious emails or Teams messages. ...
  2. If the suspicious message appears to come from a person you know, contact that person via another means like by text message or a phone call to confirm it.
  3. Report the message (see below).

Who do I report phishing attempts to? ›

Forward phishing emails to [email protected] (an address used by the Anti-Phishing Working Group, which includes ISPs, security vendors, financial institutions, and law enforcement agencies). Let the company or person that was impersonated know about the phishing scheme.

What would happen if you respond to a phishing attempt? ›

Your email security tools might then recognize the attacker as someone you trust, allowing future phishing attempts to land directly in your inbox. Additionally, any personal information you provide can be used for hard-to-spot spear-phishing attacks against you.

What happens if I open an attachment from a phishing email on my iPhone? ›

If you downloaded any attachments from a phishing email, don't open them — they could contain malware that can steal your personal information or lock you out of your data. Not sure if your device has a virus from a suspicious email or URL? Look out for these system hiccups: Performance delays.

What happens if you get phished? ›

When you are phished, scammers convince you to give up sensitive data — such as passwords, bank account information, or your Social Security Number (SSN) — by tricking you with beguiling emails, phone calls, and texts. With firm purchase on your information, phishers can steal your money or, worse, your identity.

What to do if you receive phishing emails? ›

Online Messages
  1. Do not open it. ...
  2. Delete it immediately to prevent yourself from accidentally opening the message in the future.
  3. Do not download any attachments accompanying the message. ...
  4. Never click links that appear in the message. ...
  5. Do not reply to the sender. ...
  6. Report it.

How common are phishing attempts? ›

Editor's Picks: Top Phishing Attack Statistics

According to GreatHorn, 57% of organizations experience phishing attempts on a weekly or daily basis. Almost 1.2% of all emails sent are malicious, amounting to approximately 3.4 billion phishing emails each day.

Does reporting phishing emails do anything? ›

By reporting phishing attempts, you can: reduce the amount of scam communications you receive. make yourself a harder target for scammers. protect others from cyber crime online.

Is it worth reporting a scammer? ›

If you have fallen victim to scams or fraud, we encourage you to file a report with federal and state agencies. Also, contact law enforcement offices in your local area to report the crime.

Do spammers know if you open their email? ›

The worst case is that the scammers will see you've opened their email. They can then gather information such as your location, IP address, device type, and operating system (e.g., Microsoft, Mac, Android, iOS).

What if I clicked on a scammer link? ›

If you've clicked on a phishing link and were taken to a potentially malicious website, don't enter any information or interact with the website in any way (e.g., click other links or accept cookies). What you need to do is leave the fake website immediately to avoid further problems. Disconnect from the internet.

Does opening a phishing email do anything? ›

If you open an email from a scammer without interacting with it, it won't infect your machine, but the scammer will be able to gather data to use for targeted cyber attacks. For example, the scammer may be able to gather your IP address, the Operating System (OS) that you use and your location.

What to do if you accidentally open a phishing email on iPhone? ›

4 steps to take after opening a phishing email
  • Mark the email as spam. ...
  • Report the email to your IT department or company. ...
  • Don't reply or click on links or attachments. ...
  • Delete the email.
May 26, 2024

What if I accidentally opened a spam email attachment? ›

Mark as Spam

If you accidentally open the email on your phone or other device, it is important to mark it as spam. Most email services, such as Gmail and Apple, can filter spam messages and keep them in a separate folder.

What happens if I preview an attachment from a phishing email? ›

Opening an infected attachment can have serious consequences. It may launch a keylogger which steals personal information such as usernames and passwords, takes periodic screenshots, grabs sent emails or harvests credit card numbers and bank details.

What should you do if you receive an email that looks suspicious in Northwell? ›

If you receive a suspicious email, report it, by clicking on the “Report Phishing” button in Outlook, or by forwarding the email to [email protected]. Not all social engineering attacks start with an email. Voice phishing attacks, also known as “vishing,” are carried out over the phone.

What should you check if you think an email is a phishing attempt? ›

3. Spelling, grammar, and layout. Phishing emails often have poor grammar, sentence structure, spelling errors and formatting issues. Reputable organizations generally send professional communications.

What is a common indicator for a phishing attempt? ›

Bad spelling and incorrect grammar are also common indicators of phishing attempts. Emails originating from legitimate sources will usually be free of such issues, especially if the sender is a native English speaker.

When receiving a suspected phishing phone call what should you do? ›

There are things you can do to protect yourself from scams: Say no: Ignore a caller that asks you for personal information, such as your PIN, or tells you that your computer has a virus. A genuine organisation will never ask you for these details over the phone, in an email or in writing.

Top Articles
Joseph Darby on LinkedIn: Mark Zuckerberg has an annual salary of $1. (But this isn’t as selfless… | 42 comments
Special Ocassions - What is the tradition behind hanging Christmas stockings?
Nullreferenceexception 7 Days To Die
Spectrum Gdvr-2007
Toa Guide Osrs
Southside Grill Schuylkill Haven Pa
877-668-5260 | 18776685260 - Robocaller Warning!
GAY (and stinky) DOGS [scat] by Entomb
Www Thechristhospital Billpay
Western Razor David Angelo Net Worth
De Leerling Watch Online
4302024447
Wnem Radar
Everything You Need to Know About Holly by Stephen King
Industry Talk: Im Gespräch mit den Machern von Magicseaweed
Nba Rotogrinders Starting Lineups
7543460065
Missed Connections Dayton Ohio
Wizard Build Season 28
Extra Virgin Coconut Oil Walmart
Me Cojo A Mama Borracha
8664751911
Willam Belli's Husband
Nordstrom Rack Glendale Photos
Craigslist Maui Garage Sale
Rural King Credit Card Minimum Credit Score
11 Ways to Sell a Car on Craigslist - wikiHow
Southland Goldendoodles
Naya Padkar Gujarati News Paper
Waters Funeral Home Vandalia Obituaries
Was heißt AMK? » Bedeutung und Herkunft des Ausdrucks
Fbsm Greenville Sc
2487872771
Chase Bank Cerca De Mí
Drabcoplex Fishing Lure
Reborn Rich Ep 12 Eng Sub
Edict Of Force Poe
Regis Sectional Havertys
Mandy Rose - WWE News, Rumors, & Updates
Winco Money Order Hours
PruittHealth hiring Certified Nursing Assistant - Third Shift in Augusta, GA | LinkedIn
Sukihana Backshots
Wilson Tattoo Shops
What Is A K 56 Pink Pill?
Ethan Cutkosky co*ck
How To Customise Mii QR Codes in Tomodachi Life?
Leland Westerlund
Yosemite Sam Hood Ornament
Michaelangelo's Monkey Junction
Great Clips Virginia Center Commons
O.c Craigslist
Adams County 911 Live Incident
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 5785

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.