I think I got a phishing email. Can you tell me if the email legit?


Sometimes it's really difficult to tell if a message is legitimate or a phishing message.  This FAQ explains what to do if you're not sure.


If you don't recognize the sender

If you don't recognize the sender or subject of the message you should be suspicious.  If the message contains attachments or links, do not click on any of them.  They may load harmful malware on your computer or compromise your username and password.

If you recognize the sender

If you do recognize the sender, but are still suspicious, contact the sender and ask if the message is legitimate.  Don't click on any links if you're suspicious.

What does a phishing message look like?

Here is an example of what a phishing scam in an email message might look like.

What is phishing


  • Spelling and bad grammar – Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.

  • Beware of links and attachments in email – If you see a link or attachment in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.


    Phishing scams masked web address


    Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats – Have you ever received a threat that your account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.

  • Spoofing popular websites or companies – Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, see Avoid scams that use the Microsoft name fraudulently.

    Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.