These 3 phishing emails appeared in the last few days!
Phishing works in different ways. Fake websites, emails that appear to come from a well-known person or institution, such as a bank, and SMS can be used in a phishing attack. Fraudsters try to make the original website, the cover letter from a friend or an institute, or the said SMS look as similar as possible to the original.
These fake pages and documents are then distributed and criminals hope that users will log in to these fake pages with their original data and thus be able to access this information.
The term 'phishing' is borrowed from the English word 'fishing' and describes an activity carried out by internet criminals. They fish out user data. The device does not necessarily have to be infected with a virus or Trojan virus , which is why users are also named as victims when reporting on phishing attacks. A phishing attempt can be suffered even if the computer is virus-free.
The sender of the email shown above claims to be ING-DiBa. The email is not sent in a targeted manner and therefore also reaches people who do not have an account with ING DiBa. The argument in the email is an alleged security change; in order to put pressure on the recipient, a deadline of 48 hours is set in which to act.
An email whose sender claims to be a savings bank works in a very similar way, but uses a different argument to mislead the recipients. The general uncertainty surrounding the GDPR discussion is being exploited here. It is claimed that measures must be taken due to the GDPR.
Ultimately, a classic is currently on the way. This is an email that claims to be a “Security Center Warning” from Amazon. Of course, this email does not come from Amazon, but was sent by scammers. The name, logo and corporate design are misused here in order to create a false authenticity and to convince the recipients of this email that it is a real email from Amazon.
What you can do!
As the Federal Office for Information Security reports, phishing emails and fake websites to obtain access data and other personal information are becoming increasingly professional. From blackmail attempts via email , fake invoices to the pretext of logging into a fake site, are more successful than ever before .
In the new explanatory video, the BSI gives tips on how such fraud attempts can be uncovered:
Basically, security software can help preventatively ! Despite all caution, it can still happen from time to time that you have fallen victim to a phishing attack and have unintentionally disclosed your personal data to third parties. The important thing is: Don't panic, but act immediately!
So that you actually know what to do in an emergency, here are our step-by-step instructions:
- Contact the company for which your personal user or login information was stolen immediately. Please call customer service to have your account blocked. Banks in particular have a blocking hotline that can be reached around the clock and is available specifically for such and similar cases. Describe your case and your account or user area will no longer be accessible with the old login data.
- Log in to your user account and check whether you can still log in. If this is still possible, go immediately to the area where you can change your current login details. Set a new password and, if possible, also change the user name and contact address.
- Check immediately whether account changes or transactions have already been made , as criminals are usually very quick. Check whether, for example, goods have been purchased or debits have been made for which you are not responsible. If this is the case, inform the customer service of the respective provider immediately.
- Document all abnormalities . Take screenshots, print out bank statements and the phishing email, or forward the email to the company in whose name the cybercriminals sent the phishing email.
- Contact a lawyer who specializes in internet fraud , describe your case and submit all documents related to the fraud. You should contact the lawyer even if you have not yet reported any damage.
- 2 -factor authentication (if offered) prevents access even if fraudsters have obtained the access data through phishing.
By the way, there is also hope in phishing that stolen funds, for example from online banking, will be replaced by banks. The basis for this is the Civil Code. According to § 675u BGB, payment service providers are obliged to replace the stolen payment amounts in the event of unauthorized payment transactions. However, this only applies if the person concerned has fulfilled their duty of care. Further information on the legal basis in the event of damage can be found here .
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )




