How to Spot Phishing: The Visual and Technical Signs That Reveal Fraud
You know what phishing looks like. Misspelled words, suspicious links, Nigerian princes. You’ve done the training. You’ve passed the tests.
And yet.
Somewhere, right now, someone who knows all of this is clicking a link they shouldn’t. Not because they’re careless or stupid, but because they’re busy, distracted, and the email looked just legitimate enough.
Phishing detection isn’t about knowledge. It’s about habits that kick in automatically, even when you’re not thinking clearly.
Three seconds to decide
Section titled “Three seconds to decide”Most phishing fails a quick sanity check. The problem is we don’t do the check. We see an email, we react, we click. The trick is building a pause into that reaction:
Was this expected? Unexpected requests for credentials, payments, or sensitive data are suspicious by default.
Does the context make sense? An “account locked” email for a service you don’t use is obviously fake. But even for services you do use, did you do anything that would trigger this?
Who sent this? Look at the actual email address, not just the display name. “PayPal Security” from
security-paypal@mail-verify.netis not PayPal.
Most phishing attempts fail this 3-second test. The ones that pass deserve closer scrutiny.
URL Analysis: The Most Reliable Signal
Section titled “URL Analysis: The Most Reliable Signal”URLs are the hardest thing for attackers to fake. Learn to read them.
Domain Anatomy
Section titled “Domain Anatomy”https://account.paypal.com/login breaks down as:
https://- Protocol (should be HTTPS for any login)account.paypal.com- Domain (this is what matters)/login- Path (less important for legitimacy)
The domain is everything between :// and the next /. Within that domain, read right to left:
paypal.com- This is the actual domain (owned by PayPal)account.- This is a subdomain (controlled by whoever owns paypal.com)
Spotting Fake Domains
Section titled “Spotting Fake Domains”Attackers use several tricks:
Subdomain deception:
paypal.account-verify.com- The domain isaccount-verify.com, not PayPalsecure-paypal.com.malicious.net- The domain ismalicious.net
Typosquatting:
paypai.com(lowercase L instead of lowercase l)paypa1.com(number 1 instead of lowercase l)paypal-secure.com(adding words to legitimate brand)
Homograph attacks:
- Using characters from different alphabets that look identical
pаypal.comusing Cyrillic ‘а’ instead of Latin ‘a’
Hover Before You Click
Section titled “Hover Before You Click”On desktop, hover over links to see their destination before clicking. On mobile, long-press links to preview URLs.
If the displayed text says “www.paypal.com” but the link goes elsewhere, that’s phishing.
Email Red Flags
Section titled “Email Red Flags”Sender Address Analysis
Section titled “Sender Address Analysis”Email display names can be anything. The actual address matters.
Legitimate:
service@paypal.comnoreply@email.chase.com
Suspicious:
paypal-service@gmail.comsupport@paypal.security-verify.comalert@paypal.com.suspicious-domain.net
Content Warning Signs
Section titled “Content Warning Signs”Urgency without specificity:
- “Your account will be suspended in 24 hours” - What account? Why?
- Legitimate services provide specific details about issues
Generic greetings:
- “Dear Customer” or “Dear User” when legitimate emails would use your name
Grammar and formatting:
- Legitimate companies have professional copywriters and QA processes
- Errors suggest rushed, non-professional origin
Mismatched branding:
- Wrong logo colors, fonts, or layouts
- Images that look stretched or pixelated
- Footer information that doesn’t match the claimed sender
Attachment Suspicion
Section titled “Attachment Suspicion”Be especially cautious of:
- Unexpected attachments from anyone
- File types that can execute code (.exe, .js, .html, .zip with executables)
- “Invoice” or “Document” attachments you didn’t expect
- Password-protected files (attackers use this to bypass security scanners)
Website Authentication
Section titled “Website Authentication”When you reach a website (whether through email link or direct navigation), verify legitimacy before entering credentials.
SSL Certificate Check
Section titled “SSL Certificate Check”HTTPS with a valid certificate is necessary but not sufficient. Attackers get SSL certificates too.
What to check:
- Click the padlock icon → View certificate details
- Verify the certificate is issued to the expected organization
- Check the certificate isn’t expired
What certificates DON’T tell you:
- That the site is legitimate
- That your data is safe
- That you should trust the organization
A phishing site can have a perfectly valid SSL certificate.
Visual Consistency
Section titled “Visual Consistency”Compare against your memory of the legitimate site:
- Are colors exactly right?
- Is the logo correct?
- Is the layout what you expect?
- Do fonts look professional?
When in doubt, navigate directly to the site by typing the URL or using a bookmark. Don’t trust links.
Functionality Testing
Section titled “Functionality Testing”Phishing sites often only implement the pages needed for credential theft.
Signs of a fake:
- Footer links that go nowhere or to unrelated pages
- “Forgot password” or “Create account” links that don’t work
- Missing functionality that the real site would have
- Error messages that don’t make sense
Advanced Detection Techniques
Section titled “Advanced Detection Techniques”WHOIS Lookup
Section titled “WHOIS Lookup”Check when a domain was registered:
- Legitimate company domains are typically years old
- Phishing domains are often registered days or weeks before attacks
Use whois command or online tools to check domain age.
Certificate Transparency Logs
Section titled “Certificate Transparency Logs”Search certificate transparency logs for the domain to see:
- When certificates were issued
- How many certificates exist for the domain
- Whether the certificate history matches expectations
Browser Developer Tools
Section titled “Browser Developer Tools”For technical users:
- Inspect network requests to see where data is actually sent
- Check for suspicious JavaScript
- Look at form action URLs
What to Do When You Spot Phishing
Section titled “What to Do When You Spot Phishing”If You Haven’t Clicked
Section titled “If You Haven’t Clicked”- Don’t click anything in the suspicious message
- Report it - Forward to your IT security team or use the report phishing button
- Delete it - Remove from inbox to avoid accidental future clicks
If You Clicked But Didn’t Enter Information
Section titled “If You Clicked But Didn’t Enter Information”- Close the tab immediately
- Clear your browser cache
- Run a malware scan
- Monitor for unusual activity
If You Entered Credentials
Section titled “If You Entered Credentials”- Change password immediately on the legitimate site
- Enable 2FA if not already active
- Check for unauthorized activity in the affected account
- Report the incident to IT security
- Monitor related accounts - if you reuse passwords, change those too
Building Detection Habits
Section titled “Building Detection Habits”Practice Regular Verification
Section titled “Practice Regular Verification”Make verification automatic, not exceptional:
- Always check sender addresses
- Always hover over links before clicking
- Always navigate directly for sensitive actions
Maintain Healthy Skepticism
Section titled “Maintain Healthy Skepticism”Assume unexpected requests are suspicious until verified:
- Banks don’t email asking for credentials
- Tech support doesn’t call unsolicited
- Legitimate urgency comes with verifiable specifics
When in Doubt, Verify Out-of-Band
Section titled “When in Doubt, Verify Out-of-Band”If a request might be legitimate:
- Call the company using a number from their official website (not from the email)
- Navigate directly to the service and check your account
- Contact the purported sender through a known-good method
Organizational Detection Programs
Section titled “Organizational Detection Programs”For organizations building phishing detection capabilities:
Phishing Simulation Programs
Section titled “Phishing Simulation Programs”Regular simulated phishing campaigns:
- Establish baseline click rates
- Provide immediate education when employees click
- Track improvement over time
- Adjust difficulty as skills improve
Reporting Mechanisms
Section titled “Reporting Mechanisms”Make reporting easy:
- One-click phishing report buttons in email clients
- No penalties for reporting false positives
- Feedback on reported items to reinforce good behavior
Continuous Education
Section titled “Continuous Education”Ongoing touchpoints:
- Brief reminders about current phishing trends
- Examples of real attacks targeting your industry
- Recognition for employees who catch and report attempts
Making this automatic
Section titled “Making this automatic”Here’s what I’ve learned watching thousands of people go through phishing simulations: the ones who catch attacks aren’t the most security-aware. They’re the ones who’ve built checking into their workflow.
They hover over every link. Not because they’re suspicious of that specific email, but because that’s just what they do. They verify sender addresses the way they check their mirrors before changing lanes. Automatic.
The goal isn’t to become paranoid. It’s to make verification so routine that you don’t have to think about it.
Most phishing attempts are obvious once you look. The trick is remembering to look when you’re tired, rushed, or just trying to get through your inbox before lunch.
Build detection habits through practice, not just training. Try our interactive security exercises with phishing scenarios designed to test your reflexes, not just your knowledge.