{"id":18719,"date":"2021-09-22T11:22:59","date_gmt":"2021-09-22T11:22:59","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18719"},"modified":"2023-06-14T09:11:13","modified_gmt":"2023-06-14T09:11:13","slug":"cyber-threat-actors-how-to-spot-phishing-emails","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/","title":{"rendered":"Cyber Threat Actors &#8211; Phishing Emails:  Module 3"},"content":{"rendered":"<h2><b>How To Spot Phishing Emails\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Phishing is a hacker-favorite method of stealing personal information. While there are a few other ways to deliver malicious links (voice messages or SMS), phishing email is the most common one for organizations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As promised in the previous <a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/\">module 2<\/a>, here we give you tips and tactics to spot and avoid falling prey to phishing emails.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s start with a sample. The picture below will show you most of the indicators of a phishing campaign. We also describe them in detail further in the article.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-18720\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-3-image-1024x768.png\" alt=\"phishing email \" width=\"580\" height=\"435\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-3-image-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-3-image-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-3-image-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-3-image.png 1200w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/p>\n<h3><b>Emails With Generic Greeting or Email Text<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Most companies personalize their emails to customers. So do the partners and colleagues. Phishing emails usually contain a generic greeting like &#8220;Dear customer&#8221; or &#8220;Dear colleague.&#8221; Although this is more common with mass phishing attacks, spear attackers might also make the mistake of not addressing you by name. In addition to this, you should look for general text patterns throughout the message.<\/span><\/p>\n<h3><b>Emails With Grammar and Spelling Mistakes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Many companies use spell-checking tools, have copy editors, and ensure their emails have top grammar and spelling quality. Even if the company isn&#8217;t located in a native-speaking country, the messages get checked before clicking the &#8220;Send&#8221; button.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most hackers don&#8217;t think about looking good, keeping a company reputation, or aren&#8217;t native to the language they&#8217;re using. So, they don&#8217;t spend too many resources on message craftsmanship in a phishing email.<\/span><\/p>\n<h3><b>Messages With Inconsistencies in the Return Address<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/\">Cyber threat actors<\/a> usually open similar websites and deceptive email addresses that look almost like the real person or company. We recommend that you verify the domain name first, then you might want to search for the sender in your inbox. Minor inconsistencies like a dot or underscore in the name, a typo, or a weird-looking top-level domain should trigger mistrust.<\/span><\/p>\n<h3><b>Suspicious Attachments<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Don&#8217;t open suspicious attachments, especially those commonly associated with malware (.zip, .exe, .scr, etc.). Always run diagnostics on the files you download, using a trustworthy antivirus program.<\/span><\/p>\n<h3><b>Too Good to Be True<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The general rule of thumb is that it&#8217;s most probably a scam if you receive help or heritage over email. Incentivizing unsuspecting recipients with a possible reward is the hackers&#8217; specialty. During intricately crafted spear-phishing campaigns, the attacker might know your name, but it&#8217;s usually a phishing attempt if the offer is too tempting.<\/span><\/p>\n<h3><b>Emails With False Sense of Urgency<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Many phishing emails include an urgency in the email message to rush the recipients to take action without studying the email properly. Don&#8217;t fall for it. Find the company&#8217;s contact number and call them for clarification.<\/span><\/p>\n<h3><b>Emails With Only One Contact<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Most companies offer at least an email, a phone number, and live chat, i. e., more than one way to contact them for support. If the email doesn&#8217;t give you alternate means of communication, flag it as suspicious. You should also check the company&#8217;s website to ensure it isn&#8217;t fake.<\/span><\/p>\n<h2>Conclusion<\/h2>\n<p>Although spotting phishing emails and dealing with them is a reactive tactic against cyberthreats, it\u2019s not the worst. However, leaving it to chance can wreck havoc to your organization. The <a href=\"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/\">next module<\/a> dwells on two case studies, showing what happens to large organizations when they neglect email security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How To Spot Phishing Emails\u00a0 Phishing is a &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-18719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Actors - Phishing Emails: Module 3 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Actors - Phishing Emails: Module 3\" \/>\n<meta property=\"og:description\" content=\"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-22T11:22:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T09:11:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Cyber Threat Actors &#8211; Phishing Emails: Module 3\",\"datePublished\":\"2021-09-22T11:22:59+00:00\",\"dateModified\":\"2023-06-14T09:11:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/\"},\"wordCount\":558,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/\",\"name\":\"Cyber Threat Actors - Phishing Emails: Module 3 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"datePublished\":\"2021-09-22T11:22:59+00:00\",\"dateModified\":\"2023-06-14T09:11:13+00:00\",\"description\":\"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-how-to-spot-phishing-emails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Cyber Threat Actors &#8211; Phishing Emails: Module 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Actors - Phishing Emails: Module 3 | EasyDMARC","description":"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Actors - Phishing Emails: Module 3","og_description":"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.","og_url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-22T11:22:59+00:00","article_modified_time":"2023-06-14T09:11:13+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Cyber Threat Actors &#8211; Phishing Emails: Module 3","datePublished":"2021-09-22T11:22:59+00:00","dateModified":"2023-06-14T09:11:13+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/"},"wordCount":558,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/","url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/","name":"Cyber Threat Actors - Phishing Emails: Module 3 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","datePublished":"2021-09-22T11:22:59+00:00","dateModified":"2023-06-14T09:11:13+00:00","description":"In this series of articles we will present Cyber threat Actors and how to spot phishing emails during a phishing attack - their characteristics and look.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","width":1440,"height":910,"caption":"top image 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"Cyber Threat Actors &#8211; Phishing Emails: Module 3"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18719"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18703"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}