Accessibility Resource Center Skip to main content

Anatomy of a phishing attack

The best defense against phishing attacks? Knowing what to watch for—and what to do if you’re targeted.

An unexpected text message arrives on your phone. It reads: “Your package has arrived but could not be delivered. Please click to confirm your address.” And it includes a link to what looks like a familiar delivery company’s website. But when you take a closer look at the text message, the phone number is not one you recognize. Or perhaps you receive an email that looks like it comes from your bank, with a subject line that says “URGENT: Payment overdue.” How could this be? You see that there’s also an attachment called “invoice.” But in the email, the sender’s email address misspells your bank’s name.

These are just two examples of what phishing attacks could look like. In both instances, bad actors may be trying to get you to provide sensitive information such as credentials, passwords, account information or some other personal information—or perhaps even download malware (malicious software meant to disrupt or steal data) onto your device that might, for example, seek out confidential personal or corporate information.

How can you spot phishing attacks—and what should you do if you’re targeted by one?

What is a phishing attack, really?

A phishing attack is when bad actors impersonate legitimate institutions as a way to get potential victims to share sensitive data such as passwords, bank or credit card information and Social Security numbers. It’s a type of social engineering: When perpetrators pretend to be something they’re not (such as a company, an authority figure or family member) and use psychological manipulation or social pressure to get users to click links or divulge information because they think it’s for a legitimate request. The perpetrator’s attempt to contact you can happen via email, text or even a phone call.

Phishing attacks are becoming increasingly common: The FBI’s Internet Crime Complaint Center lists it as the most reported complaint in 2022.

You might hear other terms used to describe specific types of phishing attacks:

How to identify a phishing attack

Most phishing attacks can be identified through a few common features, listed below. When in doubt, delete the message—do not click any attachments or links, do not share any information and do not respond. If it’s a voice call, end the call immediately.

Verizon has put together a list of helpful phishing attack email examples as well as smishing examples—take a look to familiarize yourself with what’s out there now.

What to do next

Let’s go back to the start of our story with the text message and the fake “invoice.” What should you do if you clicked the link or the file before you took a closer look and spotted that they were problems?

Remember, phishing is common and perpetrators are hoping to catch you with your guard down. But most companies will never proactively reach out to you. And Verizon will never proactively contact a customer asking for sensitive information such as a password, account PIN or to perform authentication.

So keep it simple: Trust your gut. When in doubt, hang up, delete the message and contact the respective company directly.

If you receive a suspicious text message claiming to be from Verizon, please forward it to us right away at S-P-A-M (7726). You can also report it to the Federal Trade Commission.

Verizon makes it easy to protect your mobile accounts and identity. Here’s how.

Continue reading

Fighting password fatigue: how to secure your digital life

The passwords that protect our online identities and accounts are hard to manage—and often easy for others to guess. Here’s how to regain control and fight password fatigue.

What you need to know about multi-factor authentication

Passwords help keep our sensitive information safe, but multi-factor authentication can add powerful layers of protection. Here’s how it works.