Table of Contents
- What Is Phishing and Why It Still Works
- Email Phishing
- SMS Phishing (Smishing)
- Social Media Phishing
- Spear Phishing and Whaling
- How to Verify URLs and Domains
- Reading Email Headers Like a Pro
- Password Managers: Your First Line of Defense
- Two-Factor Authentication Done Right
- How to Report Phishing
- Complete Anti-Phishing Checklist
What Is Phishing and Why It Still Works in 2026
Phishing is the act of impersonating a trusted entity -- a bank, a tech company, a government agency, a colleague -- to trick you into revealing sensitive information such as passwords, financial data, or personal details. Despite being one of the oldest types of cybercrime, phishing remains the most successful attack vector in 2026, responsible for over 90% of data breaches worldwide.
The reason phishing endures is simple: it targets the human, not the machine. You can have the most advanced firewall, the most secure operating system, and the strongest encryption in the world, but none of that matters if you hand your credentials to an attacker because you thought you were logging into your real bank account.
Modern phishing has evolved far beyond the poorly written emails of the early 2000s. Today's phishing attacks use AI-generated text that is grammatically perfect and contextually relevant. They clone websites pixel by pixel. They spoof email addresses with surgical precision. They even intercept two-factor authentication codes in real time. The era of spotting phishing by looking for typos is over.
This guide covers every major phishing vector active in 2026, teaches you how to verify the authenticity of communications and websites, and provides concrete tools and practices to make yourself a much harder target. Whether you are protecting personal accounts, cryptocurrency wallets, or corporate systems, these principles apply universally.
Never click a link to log in. Instead, always navigate directly to the website by typing the URL in your browser or using a bookmark you created yourself. This single habit defeats the vast majority of phishing attacks.
1. Email Phishing
Email phishing is the most common form of phishing and the one most people think of first. The attacker sends an email that appears to come from a trusted source -- your bank, Amazon, Apple, Microsoft, a crypto exchange -- and attempts to get you to click a link, download an attachment, or reply with sensitive information.
Common Email Phishing Tactics
Account compromise alerts. "We detected suspicious activity on your account. Click here to verify your identity." This creates urgency and fear, overriding critical thinking. The link leads to a cloned login page that captures your credentials.
Payment and invoice scams. "Your payment of $499.99 has been processed. If you did not authorize this transaction, click here to dispute." Victims panicking about an unexpected charge click without thinking and land on a credential harvesting page.
Package delivery notifications. "Your package could not be delivered. Click here to update your shipping information." With the rise of e-commerce, these are extremely effective because most people are expecting a delivery at any given time.
Password reset requests. "Someone requested a password reset for your account. If this was not you, click here to secure your account." Ironic, since clicking the link is what actually compromises the account.
CEO and executive impersonation. Emails appearing to come from a company's CEO asking an employee to wire funds, purchase gift cards, or share sensitive data. These are often well-researched and highly targeted.
How to Identify Phishing Emails
- Check the sender's actual email address. The display name might say "Apple Support" but the email address could be
[email protected]. Always examine the full email address, not just the display name. - Hover over links before clicking. On desktop, hover your mouse over any link to see the actual URL in the bottom-left of your browser or email client. If it does not match the expected domain, do not click it.
- Look for generic greetings. "Dear Customer" or "Dear User" instead of your actual name can indicate a mass phishing campaign. However, sophisticated attacks will use your real name, so this alone is not a reliable indicator.
- Check for urgency and threats. "Act within 24 hours or your account will be closed" is a pressure tactic. Real companies rarely set threatening deadlines in emails.
- Examine the email for inconsistencies. Mismatched logos, unusual formatting, links that go to different domains than the supposed sender, and subtle differences from how the real company typically communicates.
- Beware of attachments. Unexpected attachments -- especially .zip, .exe, .docm, or .html files -- should never be opened. Even PDFs can contain phishing links or exploit code.
Example: Spotting a Phishing Email
From: [email protected] (notice "app1e" with a number 1 instead of the letter l)
Subject: "Urgent: Your Apple ID has been locked"
Link URL: https://apple-id-verify.suspicious-domain.com/login
Legitimate Apple emails come from @apple.com or @email.apple.com domains and link to apple.com
2. SMS Phishing (Smishing)
Smishing -- SMS phishing -- uses text messages instead of emails to deliver phishing attacks. This vector has exploded in recent years because people tend to trust text messages more than emails, phone screens make it harder to examine URLs, and mobile devices often lack the security tools available on desktops.
Common Smishing Tactics
Bank fraud alerts. "ALERT: Unusual transaction on your account. If you did not make this purchase, call this number or click this link." The link leads to a fake bank login page. The phone number connects to a scammer pretending to be bank support.
Package delivery failures. "UPS: Your package needs updated delivery information. Visit [link]." These messages often include a shortened URL that masks the actual malicious destination.
Tax refund notifications. "IRS: Your refund of $3,247.00 is ready. Verify your identity to receive it: [link]." Government agencies do not communicate refund information via text message.
Crypto exchange alerts. "Coinbase: Withdrawal of 2.5 BTC initiated from your account. If unauthorized, verify here: [link]." This exploits the fear of losing cryptocurrency to drive immediate, unconsidered action.
Multi-factor authentication interception. "Your verification code is 847291. If you did not request this, your account may be compromised. Call [number]." The scammer is attempting to log in to your account in real time and needs the code you just received. They call or text pretending to be support and ask you to read them the code.
How to Protect Against Smishing
- Never click links in text messages from unknown numbers. If a message claims to be from your bank, open your browser and navigate to the bank's website directly.
- Do not call numbers provided in suspicious texts. Look up the company's official phone number independently through their website or the number on the back of your card.
- Never share verification codes with anyone. No legitimate company will ever call or text you asking for a code they just sent you. This is always a social engineering attack.
- Enable message filtering on your phone. Both iOS and Android offer built-in spam filtering for text messages. Third-party apps like Robokiller or Truecaller add additional protection.
- Report smishing messages. Forward suspicious texts to 7726 (SPAM) in the US. This reports the message to your carrier.
3. Social Media Phishing
Social media platforms -- X (Twitter), Instagram, Facebook, LinkedIn, Discord, Telegram -- are prime hunting grounds for phishing attacks. Attackers exploit the social trust inherent in these platforms, where people expect to interact with strangers and are accustomed to clicking links shared by others.
Attack Vectors on Social Media
Fake customer support accounts. When you publicly complain about a service on X, scammers posing as the company's support team immediately DM you with a "help" link. These fake support accounts often have usernames like "@BankSupport_Help" or "@CoinbaseAssist" and may even have a blue checkmark (purchased, not verified).
Compromised accounts sharing malicious links. When a friend or influencer's account is hacked, the attacker posts phishing links to their followers. Because the content comes from a trusted source, engagement rates are dramatically higher than with unknown accounts.
Fake giveaways and contests. "RT and click this link to claim your prize!" These are especially prevalent in the crypto space, where fake giveaways impersonate major projects and personalities. The "claim" page is a wallet-draining contract or credential harvesting site.
LinkedIn job scams. Fake recruiters offer attractive job opportunities and direct victims to fill out "application forms" that collect personal information, or to download "job description" files that contain malware.
Discord and Telegram bot phishing. Malicious bots in crypto Discord servers and Telegram groups post fake announcements about airdrops, token migrations, or security updates. These messages include links to phishing sites designed to steal wallet credentials or trick users into signing malicious transactions.
Protection Strategies
- Verify account authenticity. Check the account age, post history, follower count, and interactions. Fake support accounts are usually newly created with minimal history.
- Never enter credentials through a link from social media. If someone directs you to log in somewhere, navigate there independently.
- Disable DMs from strangers on platforms where this is possible, especially Discord and Telegram.
- Be skeptical of giveaways. Verify any giveaway or airdrop through the project's official website and verified social accounts.
- Use separate email addresses for social media and for financial/crypto accounts. If your social media email is compromised, your financial accounts remain protected.
4. Spear Phishing and Whaling
While standard phishing casts a wide net, spear phishing is a targeted attack aimed at a specific individual or organization. Whaling is the subset that targets high-value individuals -- C-suite executives, crypto whale wallets, or high-net-worth individuals. These attacks are meticulously researched, highly personalized, and devastatingly effective.
A spear phishing email might reference your real colleagues by name, mention a project you are actually working on, or cite a real event you recently attended. The attacker has done their homework -- often spending days or weeks gathering information from LinkedIn, social media, corporate websites, and data breaches -- to craft a message that is nearly impossible to distinguish from a legitimate communication.
How Spear Phishing Attacks Are Crafted
- Reconnaissance. The attacker identifies the target and gathers information from public sources: LinkedIn profile, company website, social media, conference attendance, published articles, and data from previous breaches.
- Pretext creation. Using the gathered intelligence, the attacker crafts a believable scenario. For example, an email from a known business partner referencing a real ongoing project and attaching a "contract revision" that is actually malware.
- Delivery. The message is sent from a spoofed email address that closely mimics a trusted contact, or from a compromised legitimate account. The technical headers may even pass basic email authentication checks.
- Exploitation. The target, believing the message is legitimate because it contains accurate personal and contextual details, clicks the link or opens the attachment. Credentials are stolen, malware is installed, or funds are transferred.
Defense Against Spear Phishing
- Verify unusual requests through a separate channel. If you receive an email from your CEO asking you to wire money, call them on the phone (using a number you know, not one from the email) to confirm.
- Limit the personal information you share publicly. Every piece of data you post online is potential ammunition for a spear phishing attack.
- Be especially cautious with financial requests. Any email asking for money transfers, cryptocurrency transactions, or gift card purchases should be verified through multiple independent channels.
- Use email security tools that analyze message headers, check domain reputation, and flag anomalies like display name spoofing or domain lookalikes.
- Implement sender verification policies in organizations. Require out-of-band confirmation for all financial transactions above a certain threshold.
5. How to Verify URLs and Domains
The ability to read and verify URLs is perhaps the single most important anti-phishing skill you can develop. Every phishing attack ultimately relies on directing you to a malicious URL. If you can reliably distinguish real URLs from fake ones, you are immune to the vast majority of phishing attempts.
Anatomy of a URL
Understanding URL structure is essential. Consider: https://accounts.google.com/signin/v2/identifier
https://-- The protocol. HTTPS means encrypted, but does NOT mean safe. Phishing sites use HTTPS too.accounts.google.com-- The domain. This is the only part that matters for determining who controls the site./signin/v2/identifier-- The path. This is controlled by whatever server hosts the domain and tells you nothing about legitimacy.
The critical skill is identifying the actual domain. The domain is the last two parts before the first single forward slash. In https://accounts.google.com/login, the domain is google.com. Everything before it (accounts.) is a subdomain controlled by the domain owner.
Common URL Tricks Used by Phishers
URL Spoofing Techniques
https://google.com.evil-site.net/login -- The domain is evil-site.net, NOT google.com. The "google.com" part is just a subdomain.
https://g00gle.com/login -- Uses zeros instead of the letter "o" (homoglyph attack).
https://google.corn/login -- Uses "rn" which looks like "m" in many fonts.
https://accounts-google.com/login -- A hyphenated variant. The domain is "accounts-google.com", not "google.com".
https://[email protected]/login -- Uses the @ symbol to make "google.com" appear as a username, while the actual destination is "evil-site.net".
Always read the domain from right to left, starting at the first single /
Verification Steps
- Read the domain carefully. Start from the rightmost part of the hostname (before the first /) and work left. The last two segments (e.g., "google.com") are the actual domain.
- Check for homoglyphs. Letters that look similar in certain fonts: l/I/1, O/0, rn/m, vv/w. Zoom in if necessary.
- Look up the domain. Use WHOIS (who.is) to check when the domain was registered and who owns it. Phishing domains are typically very new.
- Check the SSL certificate. Click the padlock icon in your browser. Verify the certificate was issued to the expected organization.
- Use VirusTotal. Paste any suspicious URL into virustotal.com to check it against dozens of security databases.
6. Reading Email Headers Like a Pro
Email headers contain the technical metadata of a message -- where it actually came from, which servers handled it, and whether authentication checks passed or failed. Learning to read headers is an advanced but powerful anti-phishing skill.
Key Header Fields to Check
Return-Path and Envelope-From. These show the actual sending address, which may differ from the "From" address displayed in your email client. If the Return-Path domain does not match the From domain, the email is likely spoofed.
SPF (Sender Policy Framework). Look for Received-SPF: pass or spf=pass in the Authentication-Results header. SPF verifies that the sending server is authorized to send email for the claimed domain. A "fail" or "softfail" is a strong indicator of spoofing.
DKIM (DomainKeys Identified Mail). Look for dkim=pass in Authentication-Results. DKIM verifies that the email content has not been tampered with and was signed by the claimed domain's key.
DMARC (Domain-based Message Authentication, Reporting & Conformance). Look for dmarc=pass. DMARC ties SPF and DKIM together and tells receiving servers how to handle messages that fail authentication.
Received headers. These show the path the email took from sender to recipient. Read them from bottom to top (bottom is the originating server). Unusual routing through unexpected countries or unknown servers is suspicious.
- Gmail: Open the email, click the three dots menu, select "Show original"
- Outlook: Open the email, click File, then Properties. Headers are in the "Internet Headers" box
- Apple Mail: Open the email, go to View menu, then Message, then All Headers
- Analysis tool: Paste headers into Google's Messageheader tool at toolbox.googleapps.com/apps/messageheader
7. Password Managers: Your First Line of Defense
A password manager is one of the most effective anti-phishing tools available, and most people do not realize why. The obvious benefit is generating and storing strong, unique passwords. But the anti-phishing benefit is even more important: a password manager will not autofill your credentials on a phishing site.
When you save credentials for google.com in your password manager, it associates those credentials with that exact domain. If you land on g00gle.com or google.com.evil-site.net, the password manager will not offer to fill in your Google credentials because the domain does not match. This is an automatic, foolproof phishing detection mechanism that works even when your eyes are deceived.
How to Use Password Managers Effectively
- Use a reputable password manager. 1Password, Bitwarden, and KeePassXC are industry leaders with strong security track records. Avoid browser-only password storage, which lacks the security features of dedicated managers.
- Generate unique passwords for every account. Use the built-in generator to create long, random passwords (20+ characters). Use a tool like the SpunkArt password generator for additional security needs.
- Let the password manager autofill. Do not manually copy-paste passwords. Let the autofill mechanism verify the domain for you. If the autofill does not trigger, that is a signal that you may not be on the correct site.
- Secure the master password. Your master password should be long (5+ random words), memorable, and never used anywhere else. Consider writing it down and storing it in a physical safe as a backup.
- Enable 2FA on the password manager itself. Your password manager is the keys to your entire digital life. Protect it with a hardware key if possible.
If you arrive at a login page and your password manager does not offer to autofill your credentials, stop. This may mean you are on the wrong site. Verify the URL character by character before entering anything manually.
8. Two-Factor Authentication Done Right
Two-factor authentication (2FA) adds a second layer of security beyond your password. But not all 2FA is created equal, and some forms provide significantly more protection against phishing than others.
Types of 2FA, Ranked by Security
1. Hardware security keys (FIDO2/WebAuthn) -- Best. Physical devices like YubiKey or Google Titan that you plug in or tap to authenticate. These are the gold standard because they are phishing-resistant by design. The key cryptographically verifies the domain of the site you are authenticating with. If you are on a phishing site, the key will not authenticate, period. No user error can override this protection.
2. Authenticator apps (TOTP) -- Good. Apps like Google Authenticator, Authy, or the authenticator built into your password manager generate time-based one-time codes. These are significantly better than SMS because they cannot be intercepted through SIM swapping. However, they are still vulnerable to real-time phishing attacks using tools like Evilginx, where the attacker proxies your session and captures the TOTP code as you enter it.
3. Push notifications -- Acceptable. Services like Duo or Microsoft Authenticator that send a push to your phone asking you to approve or deny the login. Vulnerable to "MFA fatigue" attacks where the attacker repeatedly triggers push notifications until the victim approves one out of frustration or confusion.
4. SMS codes -- Poor. One-time codes sent via text message. Vulnerable to SIM swapping (where an attacker convinces your carrier to transfer your phone number to their SIM), SS7 protocol exploits, and social engineering of carrier support staff. Never use SMS 2FA for cryptocurrency accounts or any high-value account.
2FA Best Practices
- Use hardware keys for your most important accounts. Email, password manager, crypto exchanges, and financial institutions should all be protected by FIDO2 keys.
- Use authenticator apps as a minimum standard. Every account that supports 2FA should have it enabled. An authenticator app is vastly better than no 2FA.
- Save backup codes securely. When you enable 2FA, most services provide backup codes. Store these in your password manager or written down in a physical safe. Without backup codes, losing your 2FA device means losing access to your account.
- Never approve 2FA prompts you did not initiate. If you receive a push notification or a code you did not request, someone is trying to access your account. Change your password immediately.
- Remove SMS 2FA from crypto accounts. If your exchange uses SMS as the 2FA method, switch to an authenticator app or hardware key immediately. SMS 2FA on a crypto exchange is a liability, not a protection.
9. How to Report Phishing
Reporting phishing attacks serves two purposes: it helps take down phishing infrastructure and prevents other people from falling victim. Every report matters.
Where to Report
- To the impersonated company. Most major companies have dedicated phishing report addresses. Forward phishing emails to:
[email protected],[email protected],[email protected], etc. - To your email provider. In Gmail, click the three dots and select "Report phishing." In Outlook, select "Report" then "Report phishing." This trains the spam filter for all users.
- To the Anti-Phishing Working Group. Forward phishing emails to
[email protected]. The APWG is a global coalition that works to shut down phishing operations. - To Google Safe Browsing. Report phishing URLs at safebrowsing.google.com/safebrowsing/report_phish/. This helps Chrome, Firefox, and Safari block the site for all users.
- To scam.ink. Report crypto-related phishing and scams on our platform to warn the community and build our database.
- To law enforcement. In the US, report to IC3.gov (FBI), reportfraud.ftc.gov (FTC). In the UK, report to actionfraud.police.uk.
What to Include in a Report
- The full email with headers (or full text message)
- The phishing URL (do not click it -- copy it carefully)
- Screenshots of the phishing page
- Any related domain names or IP addresses
- The date and time you received it
Complete Anti-Phishing Checklist
- Use a password manager and let it autofill credentials. If it does not autofill, verify the URL. Generate strong passwords for every account.
- Enable hardware-key 2FA on all critical accounts: email, password manager, exchanges, and financial accounts.
- Bookmark all important sites. Navigate via bookmarks, never through links in emails, texts, or social media.
- Verify URLs character by character. Read the domain from right to left. Check for homoglyphs, subdomain tricks, and hyphenated variants.
- Never share 2FA codes with anyone, regardless of who they claim to be.
- Keep software updated. Browser updates include anti-phishing protection improvements.
- Use email filtering. Enable advanced phishing protection in Gmail, Outlook, or your email provider.
- Verify unexpected requests through a separate communication channel before acting.
- Disable DMs from strangers on Discord, Telegram, and other platforms.
- Report every phishing attempt to help protect others and take down malicious infrastructure.
- Use a hardware wallet for crypto. Never enter seed phrases anywhere online. See our guide: How to Protect Your Crypto Wallet.
- Stay informed. Follow @SpunkArt13 and check scam.ink for the latest scam alerts.
Protect Yourself and Others
Report suspicious sites, verify before you click, and share this guide with anyone who needs it. Check scam.ink to search our scam database.
Search Scam Database Follow @SpunkArt13"Phishing does not exploit software vulnerabilities. It exploits human trust. The only patch is education." -- @SpunkArt13