Phishing links

From InboxSys document library
Revision as of 16:59, 31 August 2023 by Sebastian (talk | contribs) (Created page with "Category:Deliverability Category:Configuration Category:Reputation Category:E-Mail_analysis‏‎ Phishing Links are links that look as if they are trying to impersonate a different domain.Containing phishing like links in your E-Mail content is likely to get you blocked. Here are a few examples: =Standard link= <pre> <a href="https://inboxsys.com">this</a> </pre> The link looks like [https://inboxsys.com this]. In this example: * the link text is "th...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Phishing Links are links that look as if they are trying to impersonate a different domain.Containing phishing like links in your E-Mail content is likely to get you blocked. Here are a few examples:

Standard link

<a href="https://inboxsys.com">this</a>

The link looks like this. In this example:

Standard link with domain in text

Here is another example:

<a href="https://inboxsys.com">inboxsys.com</a>

This link is used to link directly to inboxsys.com. As you can see:

Phishing link

So far, so good. But the next example could lead to immediate blocks:

<a href="https://inboxsys.com">inboxsys.net</a>

The link and the link text are different domains:

Having a link link like this one in your E-Mail content will most likely get you blocked. It may look harmless, but replace "inboxsys.net" with "www.bankofamerica.com" and you have a classic phishing attempt, whereby the phisher is luring someone to a false banking login from the Bank of America. A spamfilter doesn't know the difference. A spamfilter most likely only concludes, both domains are different and therefore it may be a phising E-Mail.