Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Behind the Scam: Decoding the Secrets of Fraudulent Emails

How to tell if that email is sketchy.

Scam emails often have clues ranging from obvious to obscure. I'll take a scam email and show you what I see.
An investigator, characterized by a friendly and approachable design, using a magnifying glass to look closely at an email message on a computer screen. The scene is set in a dimly lit room, highlighting the focus on the screen, suggesting the importance of paying attention to detail. The investigator's expression is one of curiosity and determination, emphasizing the significance of scrutinizing every piece of information to uncover the truth behind the email message. This image should inspire viewers to be more diligent and thoughtful when examining their own emails.
(Image: DALL-E 3)

Emails are frequent targets of scammers trying to get our account credentials and more. I suspect many more people fall for fake emails, scams, and phishing attempts than we realize.

In this article, I’ll review a scam I received recently for signs of fakery.

Become a Patron of Ask Leo! and go ad-free!

TL;DR:

Identifying scam/spam emails

  • Look for odd sender information and mismatched or suspicious domains.
  • Look for grammatical errors and inconsistencies in the message.
  • Check the destination of any links; they may lead to phishing sites.
  • If you’re a techie, check the email’s headers for additional clues.
  • Suspicious? Delete the email without interacting with its contents.
  • Worried? Visit your email provider’s website or contact them for verification if needed.

The spam in question

Spam example.
A spam email I received. Click for larger image. (Screenshot: askleo.com)

I’ve chosen this scam because I see different versions of it a lot. Some are simple, like the example above, and others do a better job of mimicking assorted email providers. In all cases, the threat is clear: you need to take action or you risk being unable to send and/or receive email.

In my case, Gmail has helpfully determined it’s spam, but your spam filter may miss it. Let’s look at a few clues.

Clues in the From: field

From: information in spam.
Taking a look at the “From:” information. (Screenshot: askleo.com)

As you can see, I apparently sent this to myself. Of course, I did not. This is a great example of how spammers can put whatever they like in the From: field. I have no account named “Storage Accounts”, but support@askleo.com does exist.

Red flag:

  • It’s being sent from the same email address that it’s being sent to.

Yellow flag:

  • “Storage Accounts” is odd wording. I’ve never seen any email service use that term or structure.

Other flags:

Sometimes with this scam, the email will appear to be From: your actual email provider. Perhaps something like this:

Microsoft Email Support <a-completely-random-email-address@somerandomservice.com>

The random email address in the angle brackets will have no relationship with the service mentioned. It’s often some random, unrelated person’s email address. If it doesn’t match, that’s also a red flag.

Clues in the body of the email

Spam threat.
Spam threat. Click for larger image. (Screenshot: askleo.com)

The clues to look for in the body of the message are inconsistencies and poor grammar.

For example, the bar graph goes from 4.82GB to 4.86GB. That’s a useless graph. Legit email services usually won’t include anything like this or will include a bar starting at 0% used. More commonly, they simply say “Your inbox is 95% full.”

Note that it claims that your mailbox is full, but never says what the limit is. It’s implying that the limit is a very common 5GB, but if that’s the case, the mailbox is not full, since it’s apparently at 4.86GB.

Grammar issues are also common in scams. In this case, I have a couple of quibbles with the wording. Not being able to send or receive email “on” your mail account is odd. Using “Mail Account” (capitalized) in both sentences is cumbersome.  I’ve seen legitimate email with worse grammar; it’s just something to pay attention to, as it’s often a sign that something may be questionable.

Red flag:

  • Nowhere in this threat — or the entire email, for that matter — does it mention which email service it supposedly is. While many spam messages try to be more convincing, this one isn’t. This lack of identification is a big red flag. A legitimate email from your email service would identify itself clearly by name and logo.

The URL reflected in the button

The button in the spam.
Revealing the URL the button links to. Click for larger image. (Screenshot: askleo.com)

This is where things get really interesting. When I hover over the button, the link it goes to is shown by my browser below. Since it’s difficult to read in the image, it’s:

https://cloudflare-ipfs.com/ipfs/bafkreierxdpqrryyx7ssadb2hhvhrltkr22fg5ybm26fcdwvuhijzfft3i?filename=Inbox.html#support@askleo.com

The red flag:

  • The domain, cloudflare-ipfs.com, has nothing to do with my email provider. Particularly for messages relating to email usage, limits, or other problems, this domain should be related somehow to the email service you’re using, be it outlook.com, gmail.com, google.com, or something else.

The orange flag:

  • The link “Delete files to free up space” goes to the exact same destination. That the link to get more storage is the same as the one to free up space is suspicious.

Let me click that for you

Never click the links in spam. For the sake of education, I’ll show you what you get if you do.

Where you land.
Where those links would take you. (Screenshot: askleo.com)

(I changed the “support@askleo.com” in the original URL to “support@somewhere” to avoid letting the scammer know that “support@askleo.com” is legit and reading emails.)

Red flag:

  • This is likely a webmail sign-in page you’ve never seen before.

Some scammers set up a “sign in” page that looks very similar to the real thing.

The goal is simple: to get you to enter your email address and password. When you click on “Sign in,” your credentials are given to the scammer. In return, you’ll get a message that says, “The account doesn’t exist”, regardless of how many accounts you enter correctly.

Deeper into the headers

If you’re inclined to dive into a little geekiness, you can find more information that helps; you just normally don’t see it. You’ll need to “view original” or “view headers”.  How you do that varies depending on what email program you use.

Here are the headers from our example spam. I’ve added line numbers to make referencing individual items easier.

1: Delivered-To: [redacted]@gmail.com
2: Received: by 2002:a05:7022:1090:b0:77:59e4:eee6 with SMTP id ep16csp980098dlb;
3: Fri, 15 Mar 2024 05:14:56 -0700 (PDT)
4: X-Forwarded-Encrypted: i=1; AJvYcCUA7FatUr89eqdD1WBsGrT8E4vIsFImPpuW0+AO512tBoD2qsNC1MumZVEmq/1mvy2PyrhdCisgfcOjsJ+ZfLd+
5: X-Google-Smtp-Source: AGHT+IEDwh28KzBxvhXyUXNShHUGaoCAhxmKU+WdjQVV7DA5KjYhIHBWHM7ZCg3q+NLuCBD0iYyQPTJg+U4=
6: X-Received: by 2002:ac8:6211:0:b0:430:b0f3:20e8 with SMTP id ks17-20020ac86211000000b00430b0f320e8mr1908959qtb.0.1710504894958;
7: Fri, 15 Mar 2024 05:14:54 -0700 (PDT)
8: Authentication-Results: mx.google.com;
9: spf=softfail (google.com: domain of transitioning support@askleo.com does not designate 141.98.10.124 as permitted sender) smtp.mailfrom=support@askleo.com
10: Received-SPF: softfail (google.com: domain of transitioning support@askleo.com does not designate 141.98.10.124 as permitted sender) client-ip=141.98.10.124;
11: Received: by 2002:a05:622a:1051:b0:42c:65ee:2133 with POP3 id f17-20020a05622a105100b0042c65ee2133mf1189909qte.0;
12: Fri, 15 Mar 2024 05:14:54 -0700 (PDT)
13: X-Gmail-Fetch-Info: leo@askleo.com 10 mail.askleo.com 995 leo@askleo.com
14: Return-Path: <support@askleo.com>
15: X-Original-To: support@askleo.com
16: Delivered-To: leo-askleo.com@ec23.pugetsoundsoftware.com
17: Received: by ip-172-31-59-11.us-west-2.compute.internal (Postfix) id 3BC3341D05; Fri, 15 Mar 2024 05:04:10 -0700 (PDT)
18: Delivered-To: questions-askleo.com@ec23.pugetsoundsoftware.com
19: Received: by ip-172-31-59-11.us-west-2.compute.internal (Postfix) id 39D043EAA0; Fri, 15 Mar 2024 05:04:10 -0700 (PDT)
20: Delivered-To: support-askleo.com@ec23.pugetsoundsoftware.com
21: Received: from askleo.com (unknown [141.98.10.124]) by ip-172-31-59-11.us-west-2.compute.internal (Postfix) with ESMTP id AEA2641D05 for <support@askleo.com>; Fri, 15 Mar 2024 05:04:09 -0700 (PDT)
22: From: Storage Accounts <support@askleo.com>
23: To: support@askleo.com
24: Subject: Your mailbox is full.
25: Date: 15 Mar 2024 13:04:07 +0100
26: Message-ID: <20240315130407.6018636BB80BC4A1@askleo.com>
27: MIME-Version: 1.0
28: Content-Type: text/html; charset="iso-8859-1"
29: Content-Transfer-Encoding: quoted-printable

The very first thing to locate is From: line on line 22. (The colon is significant, as there may be other “From” lines without it.)

Then move to the first “Received” line above, and closest to the From: line. In our case, that’s line 21. This line tells us the origin of the message.

It claims to be “from” askleo.com, but the IP address it includes (bolded above) is suspicious because of the “unknown”. A legit server will have a legit name here. Doing a “whois”1 on the IP address tells us something very, very important.

Whois information on the IP address.
Whois information on the IP address. (Screenshot: askleo.com)

This might be the biggest red flag of all. It’s hosted in Lithuania, and the domain name associated with the IP address has nothing whatsoever to do with askleo.com.

Everything else above that “Received” line (line #21) is legit. It documents the message’s travel across the internet as well as the anti-spam measures it failed along the way.

Do this

Always remain alert and skeptical, particularly if you receive an email warning you of some dire consequences for not taking action.

If you’re concerned that the email is authentic and you need to take action:

  • DO NOT click on anything in the email.
  • Delete the mail.
  • Visit your email provider’s website yourself, and log in normally. If there’s an issue, you should see a notice of some sort (though not by the same email in your inbox).
  • If you’re still concerned, and it’s an option, contact your email provider directly and ask.

No scams here! Subscribe to Confident Computing, and you’ll see it regularly. Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

Podcast audio

Play

Footnotes & References

1: I happen to use whois.domaintools.com, but many different services provide similar functionality.

13 comments on “Behind the Scam: Decoding the Secrets of Fraudulent Emails”

  1. Recommended if you get an impersonation email like this one on your domain setup DKIM and dmarc and the case of office365 email or called exchange online setup impersonation protection. this will prevent scamers from even being able to send emails out when they do not own the domain.

    Reply
  2. When those phishing attempts came into the Ask Leo! question queue, I hovered over the link and copied it to the clipboard. I pasted it into the mywot.com website to see if it was a legitimate site, and the comments indicated it was a scam site.

    My first impression was that the warning came from FreeScout as they handle our questions and answers, but I didn’t click because clicking is the one thing you should never do until you’re sure it’s legit.

    I found the language a little suspicious, but as you said, legit emails can have bad grammar. Some IT geeks have notoriously bad language skills. Bad grammar is a sign, but many scammers are getting better at making the language sound professional.

    Reply
  3. More hints :

    – Mail account is spelled “Mail Account”, then “Mail account” right afterwards in the phishing email.

    – The phishing page is called “Webmail”. This means the scammer did not care to design a phishing page dedicated to each of his targets’ specific mail provider. No mail provider will have a log-in page called “Webmail”.

    – There’s a silly tick-box called “Secured Login session” on the phishing page. This does not mean anything, and no service displays such an option.

    Reply
  4. Here are three sites to check the safety of a link; right-click on the link in question and select Copy link address (if the link copied is different than the printed link, then that is an immediate giveaway that the link is likely fraudulent):

    https://www.scam-detector.com/validator/

    https://www.scamadviser.com

    https://www.emailveritas.com/url-checker

    (Those with a Safe Link generated by a Microsoft email client (Hotmail, Outlook.com, Msn.com, etc.) can decode it at: https://www.o365atp.com .)

    Reply
  5. When I get the spam and flag it as spam, I often get the message asking me if I want to unsubscribe or mark as spam. Always mark it as spam.

    Reply
  6. I love this! And…with the advent of excellent AI spam creation tools, I have begun to advice clients to not try to figure out on their own if something is spam or a scam. To assume that EVERY mail or text that is creating urgency or wants you to log in through that its own link is a scam. And follow the steps listed in “Do This” above.

    That said, it is very good practice for people to understand the email domains/mismatches. I had one Macaffee renewal scam that came from SomenameGambino at Gmail. I thought it was so funny that they had gone to the trouble of doing this and picked the name of a well known mafia family!

    Reply
  7. When I receive ANY email message from an unrecognized source, the first thing I check is the name to whom it’s addressed (if there is one). If there is no name, or it’s not my name, the message’s spam, and I send it to my email account’s spam folder. This scenario accounts for nearly 99% of the spam mail I receive. As for the few messages not covered above, I do as Leo suggests in this item.

    Ernie (Oldster)

    Reply
  8. Closely examining certain suspicious E-Mail can provide entertainment. Regarding the example message: When I saw the graph, I knew instantly that whoever had composed this had failed fifth-grade math! When yo right-clicked the “Get More Storage” link to get the target address, I said, “Iiiiiiii seeeee…!” in a nasal voice (viewers of a certain “Honeymooners” episode will know what I’m imitating). That target link ALONE would be more than enough to tell me the message was Spam and would guarantee that, no matter what ELSE I found, I would treat it accordingly. For me, any further delving would just be for fun.

    Yes, I might try plowing through the headers, but I’m not as good at it as Leo; I would probably have overlooked the “Unknown” header, and even if I had caught it, I wouldn’t know what to do with it. (Now I know — thanks, Leo! — but in most cases, such as this one, I would usually consider “it not worth the effort.” But had I done so, the “Lithuania” source would have had me howling with delight, and sending to my Spam folder in triumph. See? Spam can be FUN!!!) :o

    Reply
  9. I’ve seen phishing emails purportedly from a bank that have inline links to the banks website with logo, privacy statements & other artwork. These look quite realistic.

    There is also a theory that a lot of mistakes & inconsistencies are to weed out anyone who is in the least bit suspicious & discerning. They are essentially a test of gullibility.

    Reply
    • I have a feeling that theory is just a conspiracy theory. I’ve read it in a few places, but it doesn’t make any sense in weeding out the non-gullible. They may vary the spelling of certain words that are red flags to spam filters, but I don’t see how this would do anything to weed out the non-gullible.

      Reply
  10. For a while I was receiving a particular set of advertising emails at my work address. They were supposedly from an individual named “Matt Hacker”. I snickered at their choice of name as I submitted them to my employer’s “Report Phish” service.

    After sending over a whole bunch of them (Matt was a persistent fellow) our security team did a detailed investigation and discovered that Matt Hacker wasn’t a computer hacker. He was a real salesperson at a real business.

    It wasn’t a scam, but it was spam, so he and his organization were still blocked. Even today I still occasionally laugh at the unfortunate coincidence of his name.

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.