Aller au contenu principal

Phishing: Real Examples of Fraudulent Emails

Real examples of phishing emails targeting seniors. How to spot a fake email, what clues to check and what to do.

Phishing: Real Examples of Fraudulent Emails

Phishing is the most widespread cyber threat. In 2024, it accounted for 39% of all reports on Cybermalveillance.gouv.fr (source: activity report, March 2025). This guide shows you, with concrete examples, how to recognise fake emails before falling into the trap.

When you receive an email that looks exactly like a message from your bank, the NHS or HMRC, it is natural to want to click. Scammers invest heavily in making their messages convincing. The good news: there are reliable clues to spot them, and once you know them, fake emails become easy to identify.

How phishing works

  1. The scammer sends an email imitating a trusted organisation — complete with logo, colours and style
  2. The message creates urgency or opportunity — “Your account will be blocked”, “A refund awaits”
  3. You click the link — it leads to a fake site reproducing the official one
  4. You enter your information — credentials, passwords, bank details are all captured

Example 1: Fake bank email

Subject: “Security alert: unusual activity on your account”

The email displays your bank’s logo and mentions suspicious activity. It asks you to “verify your identity” via a “secure” link.

Clues that reveal the scam:

  1. The sender’s email address does not end with the bank’s official domain
  2. Artificial urgency: “You have 24 hours to secure your account”
  3. The link does not lead to the official website (hover without clicking to check)
  4. It asks for sensitive information your bank would never request by email

What your bank actually does: never emails asking for your password, never demands urgent action within 24 hours, communicates security alerts through their official app.

Example 2: Fake health service email

Subject: “Health Service: refund of 287.40 pending”

Displays the health service logo, mentions a pending refund. Asks you to “update your bank details” via a link.

Clues: wrong sender domain, requests bank details by email (health services already have your details), precise amount to seem credible.

Example 3: Fake tax email

Subject: “HMRC: your tax refund is available”

Official-looking design, claims a refund will be paid within 5 working days if you confirm your bank details.

Clues: tax authorities use their official domain only, refunds are paid automatically without confirmation needed, the link goes to a non-official URL.

Example 4: Fake delivery email

Subject: “Your parcel is waiting — action required”

A delivery company logo, says a parcel could not be delivered, asks you to pay a small redelivery fee (1-3 pounds/euros).

Clues: delivery companies do not ask for payment by email, the tracking number is unverifiable on the real site, the small amount is deliberate — they want your full card details.

Example 5: Fake Netflix, Amazon or PayPal email

Subject: “Your Netflix subscription will be suspended”

Claims your payment method has expired and you must update your details.

Clues: wrong sender domain, generic greeting (“Dear customer” instead of your name), link points to an imitation URL.

The 5-point method for analysing suspicious emails

Point 1: The sender’s address

Do not look at the displayed name; check the technical email address.

Do not click. Hover over the link to see the destination address (bottom of screen or tooltip). On a phone, long-press the link without releasing.

Point 3: The tone

Phishing almost always uses urgency, fear, or the lure of money.

Point 4: Unusual requests

No official organisation will ever email asking for your password, card number, PIN or to download software.

Point 5: Text quality

While AI-generated phishing is increasingly flawless, some still show formatting anomalies, blurry images, or missing contact details in the footer.

What to do with a suspicious email

If you have not clicked

  1. Do not click anything
  2. Report as phishing/spam in your email client
  3. Delete or move to spam
  4. Warn relatives who might receive the same email

If you clicked but entered nothing

Low risk. Close the page. Clear browser cache and run antivirus.

If you entered credentials or bank details

  1. Change password immediately on the real site
  2. Call your bank if bank details were entered
  3. File a police report
  4. Report to your national cybercrime platform

Configuring your email for better filtering

  • Enable anti-spam filters (most email services have them)
  • Mark phishing emails as spam (helps the filter learn)
  • Gmail: three dots > “Report phishing”
  • Outlook: “Junk” > “Phishing”

Why phishing evolves and remains dangerous

According to security agencies, phishing campaigns are increasingly sophisticated thanks to generative AI (source: ANSSI, February 2025). AI-generated emails are spelling-perfect, personalised with your name, and sent from addresses closely imitating official domains.

That is why checking the sender’s address and link remains the most reliable reflex, much more than the visual quality of the message.


Editorial note

Sources consulted: Cybermalveillance.gouv.fr 2024 report, ANSSI threat panorama February 2025, DGCCRF 2024, signal-spam.fr.

Limitations: Examples are based on real reports but exact wording changes constantly. We could not reproduce screenshots of fake emails; descriptions are based on public reports.

Verification date: 26 March 2026

Conflicts of interest: none

Questions fréquentes