Phishing Attempts

NEW!! Got phish?

Did you receive a suspicious email, and think it might be phishing, spam, or fraudulent? Head over to to see if it has already reported. If not, forward it to

What is Phishing?

Phishing attempts use both social engineering and technical subterfuge to steal consumers' personally identifiable data and financial account credentials. 

  • Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond. 

  • Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware. Pharming crimeware misdirects users to fraudulent sites or proxy servers, typically through DNS hijacking or poisoning.

Consequences of Being Phished

  • Your email account can be hijacked and used to send spam or phishing messages to others, who are more likely to fall for a scam when they recognize the sender.

  • Financial and personal data can be stolen and used for illicit purchases, identity theft, and other nefarious purposes.
  • Your computer could be infected with viruses and spyware, and potentially used as a "zombie", a machine under remote control used to send spam and other cyber attacks.