How to Spot a Phishing Email: 10 Red Flags to Watch For

How to Spot a Phishing Email: 10 Red Flags to Watch For

Phishing emails are getting harder to detect. Learn the 10 telltale signs that an email is fake, and protect yourself from the most common cyber attack in the world.

Passwordly Team
10 min read

The Phishing Landscape in 2026

Phishing is the most common cyber attack in the world โ€” and the most successful. Over 90% of data breaches begin with a phishing email, according to Verizon's Data Breach Investigations Report. Despite decades of awareness campaigns, phishing works because it exploits human psychology rather than technical vulnerabilities.

A phishing email impersonates a trusted entity โ€” your bank, employer, a shipping company, a streaming service โ€” to trick you into clicking a malicious link, downloading malware, or revealing sensitive information like passwords, credit card numbers, or Social Security numbers.

The threat has evolved dramatically. Early phishing emails were crude: obvious misspellings, bizarre formatting, Nigerian prince inheritance scams. Modern phishing is sophisticated: pixel-perfect reproductions of legitimate emails, personalized content drawn from social media and data breaches, and increasingly, AI-generated text that eliminates the grammatical errors that once served as warning signs.

In 2026, the average person receives an estimated 5-10 phishing emails per month (most caught by spam filters). The ones that reach your inbox are the most convincing โ€” they've already passed technical detection. Your ability to recognize them is your last line of defense.

Red Flag 1: Artificial Urgency

The single most reliable indicator of phishing is manufactured urgency. Phishing emails pressure you to act immediately, bypassing your critical thinking:

  • "Your account will be suspended in 24 hours"
  • "Unusual login detected โ€” verify your identity now"
  • "Your payment failed โ€” update your information immediately"
  • "You have 1 hour to claim your refund"
  • "Immediate action required: security breach detected"

Why it works: Urgency triggers your fight-or-flight response. When you believe you're about to lose access to your bank account or email, you prioritize speed over caution. You click without examining the sender, the URL, or the plausibility of the claim.

How to protect yourself: Legitimate organizations rarely impose extreme time pressure via email. If an email demands immediate action, stop and verify independently. Don't click the link โ€” instead, open a new browser tab and navigate directly to the service's website, or call the company using a phone number from their official website (not from the email).

A legitimate security alert from your bank will still be valid if you take five minutes to verify it. A phishing attempt depends on you not taking those five minutes.

Red Flag 2: Suspicious Sender Address

The "From" name in an email is trivially easy to fake. Phishing emails routinely display names like "Apple Support," "PayPal Security Team," or "IT Department" while the actual email address tells a different story.

How to check the sender address:

  1. Look at the full email address, not just the display name. On desktop email clients, the full address is usually visible. On mobile, tap the sender name to reveal it.

  2. Check the domain carefully. Phishers use lookalike domains:

    • apple-support@apple-verify.com (not apple.com)
    • support@paypa1.com (the letter "l" replaced with number "1")
    • security@amazon.com.account-verify.net (the real domain is account-verify.net, not amazon.com)
    • support@arnazon.com (the "m" replaced with "rn")
  3. Watch for free email providers. A genuine email from Microsoft won't come from a gmail.com or yahoo.com address.

Advanced technique: Check email headers.

For suspicious emails, examine the full email headers (most email clients have an option to "View Original" or "Show Headers"). Look for:

  • SPF, DKIM, and DMARC results: Legitimate companies configure these authentication protocols. Failed checks are a strong indicator of spoofing.
  • Return-Path: The address where bounced emails go โ€” if it differs significantly from the "From" address, the email may be spoofed.

Phishers have become skilled at email domain spoofing, which is why email authentication (SPF/DKIM/DMARC) matters. But many organizations still haven't fully implemented these protections, creating opportunities for attackers.

The core objective of most phishing emails is to get you to click a link that leads to a fake website designed to steal your credentials.

How to inspect links:

  • Hover before you click. On desktop, hover your mouse over any link (without clicking) to see the actual destination URL in the bottom-left corner of your browser or email client.
  • On mobile, long-press a link to preview the URL without following it.
  • Compare the displayed text with the actual URL. A link that says "Log in to your account at paypal.com" but actually points to paypal-security-center.com is phishing.

Common link manipulation techniques:

  • Lookalike domains: g00gle.com, micros0ft.com, arnazon.com
  • Subdomain tricks: paypal.secure-login.com โ€” the real domain is secure-login.com, not paypal.com. The domain is always the part just before the .com/.net/.org
  • URL shorteners: Bit.ly, tinyurl.com, or custom shorteners hide the real destination
  • Data URIs and JavaScript redirects: Technically complex methods that hide the actual destination entirely
  • Unicode homoglyphs: Characters from other alphabets that look identical to Latin letters (Cyrillic "ะฐ" looks like Latin "a")

The safest approach: Never click links in emails that request login credentials or sensitive information. Instead, open your browser, type the service's URL directly, and log in from there. If there's really a problem with your account, you'll see it when you log in directly.

Red Flag 4: Generic or Unusual Greetings

How an email addresses you reveals a lot about whether the sender actually knows you:

Suspicious greetings:

  • "Dear Customer" or "Dear User" โ€” legitimate services you have an account with know your name
  • "Dear [your-email-address]" โ€” they have your email but not your name (likely from a breach or scrape)
  • No greeting at all โ€” jumps straight into alarming content
  • Overly formal greetings like "Dear Valued Member" when the service normally uses first names

Context matters: Your bank knows your name and typically uses it. Amazon knows your name. Your IT department definitely knows your name. An email from any of these that doesn't use your name is suspicious.

However, this red flag is becoming less reliable. Targeted phishing (spear phishing) and breached data often provide attackers with your full name, employer, and other personal details. An email that uses your name isn't necessarily legitimate. Always evaluate multiple red flags together, not any single one in isolation.

Red Flags 5-10: More Warning Signs

Red Flag 5: Unexpected attachments. Legitimate companies rarely send unsolicited attachments. Be extremely cautious with:

  • .exe, .scr, .bat, .cmd files (executable โ€” obvious malware)
  • .zip or .rar files (may contain malware, bypass email scanners)
  • .docm, .xlsm (macro-enabled Office documents โ€” a primary malware delivery method)
  • .html or .htm files (may contain credential harvesting forms)
  • Even .pdf files can contain malicious links or exploit vulnerabilities

Red Flag 6: Requests for sensitive information. No legitimate organization will ask for your password, Social Security number, credit card number, or full bank account details via email. Ever. This is the single most absolute rule in email security. If an email asks for sensitive information, it's phishing โ€” no exceptions.

Red Flag 7: Too good to be true. Prizes you didn't enter for, unexpected refunds, inheritance from unknown relatives, cryptocurrency giveaways, jobs that require no interview. When something seems too good to be true digitally, it invariably is.

Red Flag 8: Threats and intimidation. "We will report you to the IRS." "Legal action will be taken." "Your computer has been compromised." Fear-based phishing aims to panic you into acting without thinking.

Red Flag 9: Unusual requests from known contacts. If a colleague or friend sends an email with an unusual request (gift card purchases, wire transfers, clicking a strange link), their account may be compromised. Verify through a different communication channel before acting.

Red Flag 10: Errors and inconsistencies. While AI has reduced grammatical errors in phishing, look for:

  • Inconsistent branding (wrong logo, colors, or formatting compared to genuine emails)
  • Mixed languages or character sets
  • Inconsistent formatting within the same email
  • A mismatch between the email's claimed sender and the content's style

AI-Generated Phishing: The New Threat

Generative AI has transformed phishing in concerning ways:

What AI enables:

  • Perfect grammar and natural language. AI-generated phishing emails have no spelling or grammatical errors โ€” eliminating one of the traditional detection methods.
  • Personalization at scale. AI can generate thousands of unique, personalized phishing emails using data from social media, LinkedIn profiles, and previous breaches.
  • Multilingual attacks. AI produces natural text in any language, enabling phishing campaigns that target non-English speakers with the same quality.
  • Voice and video deepfakes. Beyond email, AI generates convincing voice calls (vishing) and video calls impersonating executives, colleagues, or authority figures.
  • Real-time conversation. AI chatbots can engage in back-and-forth email conversations, building trust before delivering the payload.

How to adapt:

When AI eliminates surface-level red flags (grammar, formatting), focus on behavioral and contextual signals:

  • Is this request normal for this sender?
  • Am I being asked to bypass normal procedures?
  • Does this create urgency that prevents verification?
  • Can I verify this through a separate channel (phone call, in-person, separate email thread)?

Technical defenses become more important:

  • Use a password manager โ€” it won't autofill credentials on a phishing site because the domain won't match
  • Enable phishing-resistant 2FA (hardware security keys like YubiKey) โ€” they verify the domain before authenticating
  • Keep your email client's phishing and spam filters enabled
  • Use browser-based phishing protection (built into Chrome, Firefox, Edge)

What to Do When You Spot a Phishing Email

If you haven't clicked anything:

  1. Don't click any links or download any attachments
  2. Report it: Most email clients have a "Report Phishing" button. In Gmail, click the three dots โ†’ "Report phishing." In Outlook, select "Report" โ†’ "Phishing."
  3. At work: Forward the email to your IT security team or dedicated phishing reporting address
  4. Delete the email after reporting

If you clicked a link:

  1. Don't enter any information on the page that opened
  2. Close the tab immediately
  3. Run a malware scan on your device
  4. If the link downloaded a file, don't open it โ€” delete it and scan your device

If you entered your credentials on a phishing site:

  1. Immediately change the password for that account using a strong new password
  2. Change the same password on any other site where you reused it
  3. Enable 2FA on the compromised account if not already active
  4. Check the account for unauthorized activity (login history, connected apps, forwarding rules)
  5. If financial accounts were involved, contact your bank immediately
  6. Monitor your accounts closely for the next several weeks

If you opened a malicious attachment:

  1. Disconnect from the internet (disable WiFi, unplug Ethernet)
  2. Run a full system malware scan
  3. Contact your IT department (if at work)
  4. Change passwords for sensitive accounts from a different, clean device
  5. Consider a full system restore if malware is detected

Phishing succeeds because it targets humans, not machines. No technology can fully protect you from a well-crafted phishing email โ€” your critical thinking is the last and most important line of defense. When in doubt, don't click. Verify through a separate channel. Take five minutes instead of five seconds. That pause is the difference between safety and compromise.

Related Articles

Continue exploring related topics