Real Phishing Examples: We Broke Down 5 Actual Scam Emails
Reading about phishing theory is one thing. Seeing it is another. Here are five real types of phishing emails that have targeted Australians — with a full breakdown of every red flag. Once you see these patterns, you'll spot them in seconds.
Note: We've described the patterns without reproducing actual criminal content. These represent widely reported phishing types documented by the ACCC and ACSC.
Example 1: The Fake NAB Security Alert
What it looks like: Subject: "Urgent: Suspicious Activity on Your Account" From: display name "NAB Security" but actual address: `security@nab-alerts-secure.net`
Body: Claims suspicious login activity has been detected. Provides an urgent link to "verify your account" to prevent suspension.
The red flags:
- The domain is `nab-alerts-secure.net` — not `nab.com.au`
- Banks don't send clickable links in security emails
- Generic urgency, no account-specific details
- Threat of account suspension
Example 2: The Australia Post Parcel SMS
What it looks like: SMS from random number: "AusPost: Your parcel is on hold. Pay $2.99 redelivery fee at: [suspicious URL]"
The red flags:
- Australia Post doesn't charge redelivery fees via SMS link
- The URL goes to a non-auspost.com.au domain
- Random sender number
- No tracking number provided
Example 3: The Microsoft 365 Credential Harvest
What it looks like: Email appearing to come from "Microsoft Account Team": "Your subscription has expired. Click here to update your payment details."
Link goes to a convincing but fake Microsoft login page.
The red flags:
- Hover over the link — it goes to a non-microsoft.com domain
- Microsoft communicates subscription issues through your admin console, not random email
- No specific account name or organisation mentioned
- The fake login page URL often has subtle misspellings
Example 4: The Fake Invoice from "Supplier"
What it looks like: An invoice that looks nearly identical to a real supplier's invoice, with the same logo and layout, but the sender email is `accounts@blueskycleaners.com.au` instead of `accounts@blue-sky-cleaning.com.au` and the bank details have changed.
The red flags:
- Domain name subtly different from your known supplier
- Bank details change with no prior communication
- No corresponding purchase order
- The email doesn't come from a thread with prior history
Example 5: The IT Help Desk Impersonation
What it looks like: An email that appears to come from your IT department or helpdesk: "We're conducting a mandatory password update. Please click here to reset your password within 24 hours."
The red flags:
- Your IT team would reset passwords via the actual system — not an emailed link
- The link goes to a fake login page
- Urgency: "within 24 hours"
- Generic content, not specific to your company's systems
The common thread:
Every one of these examples uses:
- A plausible sender
- Urgency
- A link or attachment
- A request for credentials, money, or personal information
Once you see the pattern, you see it everywhere.
Practise with real-looking examples:
Phishbate puts you face-to-face with realistic phishing scenarios and tests your ability to spot the red flags. The learning sticks because it's hands-on.
Think you can spot a phish?
Put your knowledge to the test with the Phishbate interactive quiz. It only takes a few minutes.
Take the Quiz →