Let’s Talk About Phishing

As our tactics to combat Phishing evolve, so do Phishing methods. Below is an example of a recent Phishing attempt received by a state employee:


At first glance, this email appears to be convincing, but upon further examination a few items stand out.

A few things to note: 
  1. The wording. It doesn’t flow as smoothly as Apple’s typical savvy messages and there is a word, “the” missing from the first sentence.
  2. The numbers. “$ 4,49”. Close, but not quite. That is a comma and not a period between the “4”s.
  3. Hovering over the link, you can see that the actual URL address will not take you to Apple.

Many cyber attacks begin with Phishing emails such as this one, so we encourage you to please be careful when you receive a suspicious email and to please forward all questionable emails to: reportspam@state.sd.us.

As our tactics to combat Phishing evolve, so do Phishing methods. Below is an example of a recent Phishing attempt received by a state employee:

At first glance, this email appears to be convincing, but upon further examination a few items stand out.

A few things to note: 

  1. The wording. It doesn’t flow as smoothly as Apple’s typical savvy messages and there is a word, “the” missing from the first sentence.
  2. The numbers. “$ 4,49”. Close, but not quite. That is a comma and not a period between the “4”s.
  3. Hovering over the link, you can see that the actual URL address will not take you to Apple.

Many cyber attacks begin with Phishing emails such as this one, so we encourage you to please be careful when you receive a suspicious email and to please forward all questionable emails to: reportspam@state.sd.us.

Separator image Posted in Uncategorized.