The most important examples of phishing e-mails to protect your business!

Exemples Emails phishing

What is a phishing email?


A phishing email is characterized by a deceptive message. It presents itself as coming from a known sender, either a direct contact or a well-known brand or service, to give the recipient confidence. It encourages them to provide information, perform an action, click on a link or simply engage in a dialogue – in short, to “take the bait”. It’s a category of spam that uses identity theft. In most cases, it serves as an entry point: once the targeted data has been recovered, the spammer can take action that will have a major impact, whether it’s a new usurpation, embezzlement or direct theft of money in the case of banking data, or the installation of a viral threat if administrator access has been recovered.

Unlike most other spams, it exploits social engineering: it’s the recipient’s actions that activate the data leak. It’s a particularly nauseating process, because it implicates the end-user in the scam, against his or her will.

So it’s vital to know how to recognize a phishing email. Here are a few examples to help you identify it.

Lottery winnings

Probably one of the oldest and most common types of phishing email: “You’ve won €XXX!
These messages aim to retrieve personal information, and will ask for a copy of an ID or a bank account details. They often feature the identity of a legal profession, such as bailiffs or notaries, and multiply well-known icons or coats of arms.
There are two immediate points to bear in mind:
– Who is the sender of the message? Is this an area corresponding to the lottery concerned? Is the e-mail address I’m being asked to contact the lottery domain?
– Is the format consistent? Does this ad correspond to other messages I’ve received from this sender?

Euromillions win phishing e-mail example

Example of a phishing e-mail presenting a Euromillions prize

Message from your bank

This type of phishing directly seeks to recover your bank or company information. By reporting a false problem, it justifies the need to fill in a form or click on a link that will itself lead to a false web page bearing the effigy of the bank concerned.

Example of a phishing e-mail imitating a bank message

Example of a phishing e-mail imitating a bank message. Office attachment integrates Wannacry ransomware

Request for payment of fees

These phishing e-mails take the form of an injunction from an outside company to pay a non-existent invoice or some other fee. Sometimes they present small sums, as in the example above, so as not to alert the recipient. Nevertheless, they remain claims for undue sums and set a precedent that may have more serious consequences down the road.

Example of a payment phishing e-mail

Example of a phishing e-mail presenting customs fees on delivery

Phishing Police

This is a type of phishing email that has been on the increase in recent years. It takes the form of a threat of prosecution or summons, in connection with a criminal charge.
As in the case of fake lottery messages, they will instruct you to contact a so-called sworn agent: a judge, policeman or bailiff to settle the proceedings, within a strict deadline.

Example of a police phishing e-mail

Example of a phishing e-mail impersonating the French National Gendarmerie for a summons to appear.

Spear phishing

Spear phishing is a type of phishing that uses data known to the target company to refine its attack. It often targets a particular mailbox whose manager has a known role, and cites the well-known name of one of the company’s managers or executives to give, as before, an urgent, authoritative or familiar feel to the attempted scam.

Example of Phishing email RIB change

Example of a phishing email requesting changes to an employee’s bank details from the HR department. The attachment is infected with the Conficker worm.


Example E-mail Phishing impersonating a company officer

Phishing e-mail impersonating a company officer requesting banking information


Example of a Spear Phishing e-mail impersonating a company officer

Example Phishing e-mail impersonating a company director about a company takeover project – The attached archive contains the Alureon rootkit.

How to recognize a phishing e-mail?

There are several points to consider when reading a new message to identify a possible phishing attempt:

  1. Do I know the sender of the message? Is it a regular contact? Is this his e-mail address?
  2. Is the message format consistent? Is this the service’s usual layout? Are the font, images and signature as usual?
  3. Is the request credible, normal?
  4. Can I check the validity of the request, by a means of communication that does not originate from the message in question?

These stages are not mutually exclusive. A message can come from a known address, but still be phishing. It could be a spoof, or my correspondent’s address could have been hacked. Similarly, a well-crafted phishing email can look exactly the same as an original message from a sender.
The first three questions should raise any doubts. This doubt must lead to verification. If it’s a regular contact or a work colleague, you should contact them directly, using the usual means of communication and not those in the message, to validate their message.
If the issuer is well known, but has no direct contact, it can be contacted via the means indicated on its website, for example.
Finally, you can contact Altospam support. We can validate the message for technical anomalies or suspicious elements. In this case, we will take this message into account in our databases, to ensure that they are better identified in the future.

How can I protect my business from phishing emails?

Protection against phishing e-mails is essential for your company’s security. These attacks can cause significant damage: theft of sensitive data, financial losses and damage to reputation. Here are some steps you can take to protect your company from phishing e-mails:

  1. Employee awareness and training: Ensure that all employees are aware of the risks associated with phishing. Organize regular training sessions to help them identify the signs of a phishing e-mail.
  2. E-mail filtering: Use e-mail filtering software like Altospam’s Mailsafe to detect and block phishing e-mails before they reach inboxes.
  3. Sender verification: Encourage employees to carefully check the sender’s e-mail address before opening any links or files. Hackers often use addresses similar to those of legitimate companies to mislead recipients.
  4. Avoid clicking on suspicious links: Encourage employees not to click on links in suspicious e-mails. Encourage them to visit the website directly by typing the URL into their browser.
  5. Use two-factor authentication (2FA): Set up two-factor authentication for sensitive accounts. This adds an extra layer of security by requiring users to provide a second proof of identity before logging in.
  6. Updates and patches: Ensure that all software, operating systems and applications are regularly updated with the latest security patches to plug known vulnerabilities.
  7. Network traffic monitoring: Monitor network traffic for outbound phishing or phishing attack attempts, which may indicate that a corporate device has been compromised.
  8. Reinforce pass words: Encourage employees to use strong passwords and change them regularly. Avoid using obvious or easily guessed passwords.
  9. Clear security policies: Establish clear security policies regarding e-mail, personal device use and Internet browsing practices.
  10. Set up simulated phishing campaigns: Carry out simulated phishing campaigns within your company to assess awareness levels and identify areas for improvement.

By adopting these best practices and making your employees aware of the dangers of phishing, you can considerably reduce the risk of successful attacks against your company.

Test Altospam’s solutions!

Thousands of companies, CTOs, CIOs, CISOs and IT managers already trust us to protect their e-mail against phishing, spear phishing, ransomware, …