{"id":2944,"date":"2022-04-13T10:10:42","date_gmt":"2022-04-13T10:10:42","guid":{"rendered":"https:\/\/www.hostinger.com\/blog\/?p=2944"},"modified":"2022-04-20T09:40:41","modified_gmt":"2022-04-20T09:40:41","slug":"beware-of-phishing","status":"publish","type":"post","link":"https:\/\/www.hostinger.com\/blog\/beware-of-phishing","title":{"rendered":"Important Information Regarding Phishing Emails Using Hostinger Name"},"content":{"rendered":"<p>We have received an increased number of phishing reports from our customers. They are receiving malicious emails which are impersonating our services and trying to steal sensitive information.<\/p><p>This is an example of a reported phishing email:<\/p><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1331\" height=\"792\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/4\/2022\/04\/image-1.png\/public\" alt=\"\" class=\"wp-image-2945\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/4\/2022\/04\/image-1.png\/w=1331,fit=scale-down 1331w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/4\/2022\/04\/image-1.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/4\/2022\/04\/image-1.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/4\/2022\/04\/image-1.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1331px) 100vw, 1331px\" \/><figcaption>Example of phishing email<\/figcaption><\/figure><p>If you received this or a similar email, please, don&rsquo;t click on any of the links, delete it, and report it to us.<\/p><h3 class=\"wp-block-heading\" id=\"h-how-to-spot-a-phishing-attack\">How to spot a phishing attack?<\/h3><p>Although we maintain controls to protect our networks and systems from cyber threats, we don&rsquo;t have control of what scammers are sending to personal customer mailboxes which are not hosted on our servers.<br><br>In an effort to protect our customers, we want to highlight a common cyber-attack that everyone should be aware of &ndash; phishing.<br><br>&ldquo;Phishing&rdquo; is the most common type of cyber attack that affects organizations and individuals worldwide. Phishing attacks can take many forms, but they all share a common goal &ndash; getting you to share sensitive information such as login credentials, credit card information, or bank account details.<\/p><h3 class=\"wp-block-heading\">Types of phishing attacks to watch out for<\/h3><ul class=\"wp-block-list\"><li><strong>Phishing: <\/strong>In this type of attack, hackers impersonate a real company to obtain your login credentials. You may receive an email asking you to verify your account details with a link that takes you to an imposter login screen that delivers your information directly to the attackers.<br><\/li><li><strong>Spear Phishing:<\/strong> Spear phishing is a more sophisticated phishing attack that includes customized information that makes the attacker seem like a legitimate source. They may use your name and phone number and refer to a specific company in the email to trick you into thinking they have a connection to you, making you more likely to click a link or attachment that they provide.<br><\/li><li><strong>Shared Document Phishing: <\/strong>You may receive an email that appears to come from file-sharing sites like Dropbox or Google Drive alerting you that a document has been shared with you. The link provided in these emails will take you to a fake login page that mimics the real login page and will steal your account credentials.<\/li><\/ul><h3 class=\"wp-block-heading\"><strong>What You Can Do<\/strong><\/h3><p>To avoid these phishing schemes, please observe the following email best practices:<\/p><ul class=\"wp-block-list\"><li>Do not click on links or attachments from senders that you do not recognize. Be especially wary of .zip or other compressed or executable file types.<\/li><li>Do not provide sensitive personal information (like usernames and passwords) over email.<\/li><li>Watch for email senders that use suspicious or misleading domain names.<\/li><li>Inspect URLs carefully to make sure they&rsquo;re legitimate and not imposter sites.<\/li><li>Do not try to open any shared document that you&rsquo;re not expecting to receive.<\/li><li>If you can&rsquo;t tell if an email is legitimate or not, reach out to company support directly via chat or contacts provided on their website. Never use contacts provided in the email.<\/li><li>Be especially cautious when opening attachments or clicking links if you receive an email containing a warning banner indicating that it originated from an external source.<\/li><li>Enable 2FA authentication on your accounts where possible.<\/li><\/ul><p>If you have opened an email but didn&rsquo;t click on anything, don&rsquo;t worry then.<br>Contact customer support via <a href=\"https:\/\/hpanel.hostinger.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Live Chat<\/strong><\/a> if you have any questions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have received an increased number of phishing reports from our customers. They are receiving malicious emails which are impersonating our services and trying to steal sensitive\u2026<\/p>\n","protected":false},"author":318,"featured_media":2166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[171],"tags":[2314,266,2341],"hashtags":[],"class_list":["post-2944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cyber-security","tag-phishing","tag-security"],"hreflangs":[],"_links":{"self":[{"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/posts\/2944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/users\/318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/comments?post=2944"}],"version-history":[{"count":1,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/posts\/2944\/revisions"}],"predecessor-version":[{"id":2946,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/posts\/2944\/revisions\/2946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/media\/2166"}],"wp:attachment":[{"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/media?parent=2944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/categories?post=2944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/tags?post=2944"},{"taxonomy":"hashtags","embeddable":true,"href":"https:\/\/www.hostinger.com\/blog\/wp-json\/wp\/v2\/hashtags?post=2944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}