Menu
Smartphone screen showing application notifications
How-To GuidesFebruary 25, 2026- Fannie

How to Spot a Phishing Email: 10 Elements to Check Every Time

TLDR

Phishing emails are designed to look identical to legitimate messages. ScamVerify™ tracks 69,088 malicious domains, and 86.7% of them use .com extensions, making them look perfectly normal. The 10-point checklist below covers what to check before clicking any link or opening any attachment.

Why You Cannot Trust Your Eyes Alone

The days of obvious phishing (broken English, Nigerian prince stories) are fading. Modern phishing emails:

  • Use perfect grammar and branding
  • Come from domains that look legitimate (.com, .net, .org)
  • Include real company logos and formatting
  • Reference real transactions or account details

Our URLhaus threat data shows the TLD breakdown of malicious domains:

ExtensionMalicious DomainsPercentage
.com59,87686.7%
.net4,0005.8%
.org3,9965.8%
.xyz7151.0%
.online1820.3%
.site1810.3%

You cannot rely on the domain extension to determine if an email is legitimate. Use the full checklist below.

The 10-Point Phishing Check

1. Sender Email Address

Look at the actual email address, not just the display name. A phishing email might show "PayPal Security" but the actual address is security@paypa1-verify.com (note the number 1 instead of the letter l).

2. Domain Spelling

Check the sender's domain character by character. Common tricks:

  • arnazon.com instead of amazon.com
  • microsoftt.com instead of microsoft.com
  • app1e.com instead of apple.com

3. Urgency Language

"Your account will be closed," "unauthorized transaction detected," "verify within 24 hours." Legitimate companies give you reasonable timeframes and multiple ways to respond.

4. Generic Greeting

"Dear Customer" or "Dear User" instead of your name. Your bank knows your name.

5. Hover Over Links (Do Not Click)

Hover your mouse over any link to see the actual destination URL. If the visible text says "Sign in to PayPal" but the URL goes to paypal-login-secure.com, it is phishing.

6. Attachment Types

Be wary of unexpected attachments, especially:

  • .zip or .rar files (may contain malware)
  • .html or .htm files (may load a phishing page locally)
  • .doc or .xls with macros (can execute malicious code)
  • .pdf files from unknown senders (can contain malicious links)

7. Reply-To Address

Some phishing emails set a different Reply-To address than the From address. If you reply, your response goes to the attacker instead of the displayed sender.

8. Inconsistent Branding

Compare the email's visual design with previous legitimate emails from the same company. Look for wrong colors, outdated logos, mismatched fonts, or formatting that does not match the company's usual style.

9. Spelling and Grammar Errors

While AI-generated phishing is improving, many emails still contain subtle errors. Look for awkward phrasing, extra spaces, or inconsistent capitalization.

10. Request for Sensitive Information

No legitimate company asks for passwords, Social Security numbers, credit card details, or bank account numbers via email. This is the single biggest red flag.

What to Do If You Suspect Phishing

  1. Do NOT click any links or open attachments
  2. Do NOT reply to the email
  3. Report it to your email provider (Gmail: click three dots > "Report phishing")
  4. Forward phishing emails to reportphishing@apwg.org
  5. Check the sender's domain on ScamVerify
  6. If the email claims to be from a company you use, go directly to their website by typing the URL yourself

FAQ

Can phishing emails infect my computer just by opening them?

In modern email clients (Gmail, Outlook), simply opening an email is generally safe. The danger comes from clicking links, opening attachments, or enabling macros. However, viewing email in HTML format can load tracking pixels that confirm your address is active.

How do phishing emails get past my spam filter?

Sophisticated phishing emails use clean domains (our data shows 86.7% use .com), proper SPF/DKIM authentication, and content that does not trigger keyword filters. They are designed specifically to evade automated detection.

What is spear phishing?

Spear phishing targets a specific individual using personal details (your name, employer, recent purchases). It is harder to detect because the email appears personally relevant. Business Email Compromise, which we cover in a separate article, is a form of targeted spear phishing.

Photo by Unsplash on Unsplash

Check any phone number, website, text, email, document, or QR code for free.

Instant AI analysis backed by millions of federal records and real-time threat data.

Check Now