Lesson 1

The CEO Needs Gift Cards ASAP!

Spotting Phishing Emails

The Setup

It's 4:47 PM on a Friday. Sarah, an accountant at TechCorp, receives an urgent email:

The Red Flags

This is a classic Business Email Compromise (BEC) attack. Let's break down what's suspicious:

  • Urgency + Secrecy: "URGENT", "Confidential", "Don't tell anyone" - attackers create pressure and isolation
  • Unusual Request: Gift cards are untraceable currency - real executives don't ask for them this way
  • Timing: Late Friday = less time to verify, more pressure to act fast
  • Email Domain: Look closely - it's "techcorp-secure.com" not the real "techcorp.com"
  • No Phone Call: A real urgent request would warrant a call, not just email

Real-World Impact

In 2023, BEC attacks caused over $2.9 billion in losses. The average successful attack steals $125,000. These aren't random - attackers research companies, learn executive names, and time their attacks carefully.

How to Protect Yourself

1
Verify Through Another Channel

Call or text the person directly using a known number - never reply to the suspicious email

2
Check the Email Address Carefully

Hover over the sender's name to see the actual address. Look for subtle misspellings

3
Question Unusual Requests

Gift cards, wire transfers, or password sharing are almost always scams

4
Report It

Forward suspicious emails to IT security - you might save a colleague from falling for it

Test Your Knowledge

Answer these questions to complete the lesson.

1. What was the first red flag in the CEO gift card email?

2. Why do attackers often ask for gift cards specifically?

3. What should you do if you receive an urgent request from an executive?

4. Why do attackers often send these emails late on Fridays?