![woman scammer with a dog photos search woman scammer with a dog photos search](https://i.ytimg.com/vi/N4_CXNOXl5A/maxresdefault.jpg)
Scammers use at least some of these elements when designing fraudulent emails to make them look convincing. These are used on the official website, in mailings and commercials, and in other design components. Graphic designĪll major international companies have their own corporate style, including wordmarks, graphic trademarks, corporate fonts, slogans and color schemes. Let’s analyze the basic techniques that fraudsters use to make emails look legitimate. After all, if it looks suspicious, a potential victim will most likely delete it despite the attractive subject and plausible sender address. Their main goal is to make message as believable as possible. Scammers pay special attention to the design of the email. Subjects related to notifications about messages and accounts (creation and confirmation of accounts, new messages, etc.).Subjects related to tracking shipments, order information and invoices (the tracking number of the shipment, tracking the shipment, etc.).Subjects related to the delivery/shipment (shipment notifications, delivery status, shipping confirmation, shipment documents, delivery information, etc.).
![woman scammer with a dog photos search woman scammer with a dog photos search](https://i.pinimg.com/736x/89/5d/c6/895dc672b9bef12cb62862d84186b689.jpg)
After sending a parcel or a document, customers worry about its successful delivery and try to follow its progress by reading any notification from a delivery service. Therefore spammers choose common phrases typical of official notifications from delivery services. The subject of the fraudulent mail should capture the imagination of recipients and encourage them to open the message, but it also needs to be plausible. They can simply insert the necessary domain name of the server into the From field. While analyzing sender address, remember that scammers do not need to hack the company servers to use the real company domain in the From field. Addresses which only indicate the sender’s address without a name.Either the real company domain or other domains not related to delivery companies might be used as a domain name. The name of the email box usually contains the same name and surname as the sender name because any difference in the data may alert the recipient to a fraudulent email. The sender name may contain the name and surname of a supposed employee, or the company name, or a position (courier, manager, etc). Addresses that resemble e-mail addresses of company employees.The latter usually appear as a random sequence of letters, words and numbers. The email address could be taken from a real user (taken from public sources or hacked mailboxes) or automatically generated addresses. The sender name still reflects the company name (FedEx, DHL Service, ) but the domain name usually belongs to a free email service or an absolutely different company. Addresses which do not resemble legitimate company addresses.The server domain name often has a real or very plausible company domain. The name of the mailbox often includes the words info, service, noreply, mail, support which are typical of email addresses used to send official notifications. Generally, they use the name of the company (DHL INC, TNT COURIER SERVICE, Fedex, etc.) as the sender name. Email addresses which closely resemble companies’ legitimate public addresses.There are several groups of email addresses seen in fraudulent emails: To confuse recipients, scammers can change parts of the address and often make it look very similar to an official address of the delivery service.
![woman scammer with a dog photos search woman scammer with a dog photos search](https://s.yimg.com/ny/api/res/1.2/2k2MgeoD011Yz0akexmO3Q--/YXBwaWQ9aGlnaGxhbmRlcjt3PTEyMDA7aD02NzU-/https://s.yimg.com/hd/cp-video-transcode/prod/2022-03/03/6221537b2a1f5e7c00632d56/6221537b2a1f5e7c00632d57_o_U_v2.jpg)
Structurally, the address in the From field looks like this: Sender Name. Headings of fraudulent emails The From field These programs are used not only to monitor user online activity and steal personal information, but also to organize botnets to distribute spam and launch DDoS attacks.