Compare suspected messages with known habits: concise versus verbose, bullets versus paragraphs, warmth versus brevity. Impersonators often swing too polite, too curt, or strangely formal. Phrases like “do the needful,” “as per,” or “revert back” can flag external origins, especially when paired with unusual pressure or secrecy.
Notice spacing, dash styles, the order of titles and phone numbers, and whether direct dial extensions match your directory. Check sending times against normal patterns and travel calendars. A midnight request from someone who never emails late should trigger verification before any approval flows forward.
Requests referencing nonexistent projects, outdated vendors, or the wrong subsidiary often betray outsiders. Attachments may be password-protected archives, image-only invoices, or cleverly named PDFs that never match your usual file conventions. If the context feels off, pause the process and verify through trusted channels immediately.
Attackers register near-twins like examp1e.com, add sneaky subdomains, or simply set the display name to your CEO while using a free mailbox. Expand the header, reveal the true sender, and compare against allowed domains, refusing to rely on friendly names alone.
Check whether Reply‑To differs from From, whether Return‑Path aligns with the visible domain, and how SPF, DKIM, and DMARC evaluated the message. “PASS” without alignment can still be risky through indirect mail paths. Quarantine or banner warnings help nonexperts pause before acting.
Compromise often surfaces through silent forwarding, auto-deletes on replies, suspicious OAuth grants to “productivity” apps, or logins from impossible locations. Audit mailbox rules, review app consents, enforce MFA, and alert on unusual sessions to ensure attackers cannot lurk and manipulate conversations undetected.
All Rights Reserved.