rtt ep 5 blog cover

Reel Time Tech: A Field Guide to Phishing Scams!

Play Video

Phishing Scams in 2025: Spot the Bait Before You Get Hooked!

Phishing scams have been around for decades, but to the surprise of absolutely no one, they’re more sophisticated than ever in 2025. Cybercriminals are evolving their tactics, leveraging AI, QR codes, and even using deepfake technology to craft near-flawless scams. These attacks don’t just target individuals - they’re a massive threat to businesses, government agencies, and beyond.

A Field Guide to Phishing Scams

Phishing is a multi-billion-dollar problem. According to Cybersecurity Ventures, the global cost of cybercrime, including phishing scams, is expected to reach $10.5 trillion annually in 2025. That’s more than the GDP of some of the world’s largest economies!

And phishing isn’t just a minor inconvenience. The Anti-Phishing Working Group (APWG) reports that phishing attacks reached a record-breaking 4.9 million incidents in 2023 – an increase from the 4.7 million attacks in 2022 & a number that continues to climb. Whether it’s an email from a “bank” asking for login details or a text claiming your “account has been locked,” the objective remains the same: steal your credentials, financial information, & personal data.

So how do these scams work, and more importantly, how can you protect yourself? Let’s break it down.

LEARN TO RECOGNIZE THE BAIT

Phishing comes in many forms, but here are the three most common threats right now:

#1 EMAIL PHISHING: THE CLASSIC CON

This is the most common phishing attack and involves cybercriminals posing as legitimate companies, banks, or government agencies. However, scammers have also been known to pose as bosses, coworkers or even loved ones who desperately need your help in a bind - hoping the existing employer power-dynamics or tugging on your heartstrings will blind you to their trickery! They use urgent language to pressure victims into acting fast – for example providing a very short “due date” or saying an account has been compromised or an invoice is overdue & action must be taken right away... that’s a RED FLAG!

phishing email example

Here are some other key things to look at when checking if an email may be a Phishing attempt:

  • Check the Sender Information
    • Scammers commonly tweak email addresses slightly, hoping the recipient doesn’t look to closely.
      • For example, instead of @Fisherstech.com, they might use @Fishertech.com.
  • Look for Spelling & Grammar Mistakes
    • Scammers don’t generally use spellcheck & these mistakes make it easy to spot a phony email.
  • Beware of Generic Greetings
    • Most legit companies who have your email ALSO have your first name, so a “Dear Customer” instead of your name is a huge red flag!
  • Hover Over Links Before Clicking
    • If the link doesn’t match the sender’s real website, don’t click.
  • Watch for Unsolicited Attachments
    • Common malicious file types include HTML, PDFs, and ZIP files. Only open files you weren’t expecting from trusted senders.

THE AI FACTOR:
Scammers are utilizing the power of AI to generate phishing emails & it's making detecting the fakes harder than ever. Attackers use AI tools to mimic legitimate promotional marketing or account-related from companies such as Amazon or Netflix, meaning a cursory glances to check for phishing isn’t going to cut it. AI is also being used to spoof real email conversations with your coworkers, even referencing recent projects or team members by name - making these scams more convincing than traditional phishing emails. It’s important to take the time to carefully inspect any & all suspicious emails – and remember, it’s always better to delete the email & reach out to the sender in a new conversation than be in a rush & click a bad link!

#2 SMISHING: IT'S A TEXT MESSAGE TRAP!

Smishing (SMS phishing) is the mobile version of phishing. Attackers send alarming texts pretending to be from banks, delivery services, or even your employer. These messages often read something along the lines of:

"Unusual activity detected on your account. Click here to secure your login."
"Your package delivery has failed. Reschedule here."
"Your account has been locked due to suspicious activity. Verify now."

The included link leads to a website where victims unsuspectingly enter their information, thinking they’re on the real website, while in reality putting their sensitive information directly into the scammer’s hands!

Here's how to handle one of these phoney texts:

  1. Don’t Click Suspicious Links: If you receive a text from a company, visit their official website directly instead of clicking the link.
  2. Check for Grammar & Formatting Issues: Just like emails, scammers won’t double check their work before hitting send, & these are easy clues to spot.
  3. Look Up the Phone Number: Scammers often use random or spoofed numbers. If the phone number is legit, a company will pop up in your results when you plug it into a search engine.
smishing pic

#3 QR CODE PHISHING: THE NEW FRONTIER

QR codes are everywhere – restaurant menus, flyers, storefronts, invoices, business cards & beyond! Cybercriminals have weaponized them, using fake QR codes that lead to fake, malicious websites.

For example, a scammer might place a fake parking meter QR code on a pay station. A user scans it, enters their credit card information - only to realize later that the payment never went through and their card information has been stolen.

How to Protect Yourself from QR Code Phishing:

  1. Verify the Source Before Scanning: If you receive a QR code via email or a flyer, double-check where it came from & ensure you trust the source BEFORE scanning.
  2. Use a QR Scanner App with a Preview Feature: Most Camera apps allow you to see the link before opening it, verify the URL looks legit before following the link.
  3. Be Cautious of QR Codes in Public Spaces: If a QR code is posted in a high-traffic area, check to see if it’s been tampered with & avoid scanning QR codes unnecessarily.

How to Protect Yourself from Phishing Scams

Phishing attacks rely on deception, but you can stay ahead of the scammers by taking proactive security measures. Here’s how:

  1. Use Strong, Unique Passwords – Avoid using the same password across multiple accounts. A password manager can help keep track!
  2. Enable Multi-Factor Authentication (MFA) – Even if a hacker gets your password, MFA can help block unauthorized access with an extra layer of security.
    • Learn more from Fisher's trusted MFA provider, Microsoft, HERE!
  3. Verify Before You Click – Whether it’s an email, text, or QR code, always double-check the URL's location before taking action.
  4. Stay Informed – Cybercriminals evolve their tactics constantly, so staying updated on the latest scams can keep you ahead.
  5. Educate Your Team & Family – Businesses should implement cybersecurity awareness training, and individuals should teach family members about phishing risks.

Want to learn more about how to protect your business from phishing attacks & other cybersecurity threats?
Click HERE to see how Fisher's, alongside trusted partners like SentinelOne - our proven endpoint and server protection provider - can help keep your team safe from cyber threats.

Check out Episode 2 of Reel Time Tech to learn more about protection from the most common cybersecurity threats!

Spot the Bait before you get Hooked!

Phishing scams are more sophisticated than ever, and as technology evolves, so do the tactics cybercriminals use. By staying informed, thinking critically, and following simple security precautions, you can avoid the bait and keep your data safe!

Next time you get a suspicious email, text, or QR code request remember these tools & flex your knowledge. As a good rule of thumb, if it feels too urgent, too good to be true, or just a little off, it’s probably a Phishing attempt - & way to go, you’ve just spotted it!

Get in Touch!

Fill out the form to connect with our Team.

Main Form (Off Canvas)

"*" indicates required fields

Name*

Leave a Comment