Before you continue

To give you the best possible experience please select your preference.

Continue
Enreach
homepage-image-tint.jpg

How to Recognize and Prevent Phishing Attacks?

Back to overview 10.02.2025 | Topic: General

What is Phishing? 

Phishing is one of the most common types of cyberattacks. In such attacks, cybercriminals use fake emails, text messages, or other communication channels to deceive users and trick them into revealing sensitive information, such as passwords, credit card details, or access credentials to information systems. 

How Does It Work? 

The attacker sends an email that appears to come from a trusted service or organization, such as a bank, the State Revenue Service, or Latvijas Pasts. These fraudulent emails typically: 

  • Create a sense of urgency (for example: "Your account will be closed unless you log in immediately"). 
  • Contain a link to a fake login page. 
  • Prompt the user to enter personal information. 

  

E-pastu drošība

How to Recognize Phishing Attempts in Emails 

To protect yourself from scams, watch for the following warning signs: 

1. Sender's Address 

Check whether the email address truly belongs to the service provider. 

Scammers often use addresses with minor alterations (for example, "@paypa1.com" instead of "@paypal.com"). 

2. Poor Grammar and Language Style 

Most official emails do not contain grammar or style errors. If you notice strange mistakes, it may be a phishing attempt. 

 

E-pastu drošība

3. Sense of Urgency 

"Your account will be closed!" or "You’ve won a prize!" – Such phrases are used to pressure you into taking immediate action. 

4. Suspicious Links and Attachments 

  • Check where a link leads before clicking (move your mouse over the link to see the destination). 

  • Do not open attachments from unknown senders, as they may contain viruses or malware. 

Paying close attention to emails can help protect your data and devices from malicious attacks 

 

Example of a Harmful Email:

Sender: noreply@bankaserviss.lv 
Subject: Important notification about your account! 

 

Hello, [Your Name]! 

We have detected suspiciuos activity on your account. To ensure the security of your data, we have temporarily limited access to your account. 
To restore access please confirming your identity by clicking on the link below: 
Confirm Identity (bankabankakrapbank.com) 
If you will not perform this action within 24 hours, your account will be permanently blocked. 
We apologize for the incoviniences and thank you for your understanding. 

Best regards, 
Customer Service Team 
Your Bank 
Signs in the Example Email That Indicate It Is Harmful: 
  • Urgency: "If you will not perform this action within 24 hours, your account will be permanently blocked." 
  • Incorrect Link: Confirm Identity (bankabankakrapbank.com) 
  • Grammar or Punctuation Errors: "To restore access please confirming your identity by clicking on the link below." 
  • Request to Enter Data: Trusted organizations usually do not ask for passwords or other sensitive information via email communication. 

What to Do If You Receive a Phishing Email? 

If you receive a suspicious email, follow these steps: 

  1. Do Not Open Suspicious Links or Attachments 

  • Never enter your personal information or click on links that appear suspicious. 

  1. Report the Incident 

  • Notify your IT department or service provider about the phishing email. 

  • If you are a private user, contact the relevant service provider or CERT.LV (the Latvian Information Technology Security Incident Response Institution) via their website: www.cert.lv

How to Properly Forward an Email to the Security Team: 

  • Outlook: Use the "Forward as Attachment" feature. 
  • Gmail: Select the email and choose "Forward as Attachment." 
  • Apple Mail: In the "Messages" menu, select "Forward as Attachment." 
E-pastu drošība

What to Do If You Fall for a Phishing Attempt? 

If you have already entered your information on a phishing platform, take these steps immediately: 

1. Change Your Passwords 

Update passwords for all accounts where the compromised password was used. 

Choose complex and unique passwords for each account. 

Learn more about creating secure passwords
Epastu drošība

2. Enable Two-Factor Authentication (2FA) 

Add an extra layer of security by enabling two-step verification on all online services where it's available. 

3. Scan Your Device for Potential Threats 

Use trusted antivirus software to scan your device and address any security vulnerabilities 

4. Monitor Your Accounts

  • Keep track of financial transactions and notifications from the services you use. 
  • Watch for unusual activities and report them to the relevant authorities. 

Always stay vigilant and act quickly to mitigate potential consequences for your security. 

 

IT drošība

How to Protect Yourself in the Future 

Educate Yourself Regularly 

  • Cyberattacks are constantly evolving, so staying informed about the latest threat trends is essential. 

Use Secure Passwords and Password Managers 

  • Strong, unique passwords are one of the most effective ways to protect your accounts. 

Be Cautious of Emails Requesting Sensitive Information 

  • Remember that legitimate companies will never ask for your passwords or credit card details via email. 
Learn more about IT support options for your business