A great example of a phishing attack is a “spoofed email from a trusted company.” Below is a detailed scenario:

Example “Your Bank Account Needs Verification”

Scenario

An attacker sends an email that appears to come from a legitimate bank, like Wells Fargo or Chase. The email is designed to exploit the recipient’s trust by mimicking the branding, tone, and formatting of official communications.

Email Details

Subject Line: “Important: Action Required to Avoid Account Suspension”

Sender Email: security@wellsfargo-support.com (looks legitimate but is fake)

Message Body

Dear Valued Customer,

We noticed unusual activity on your account and require immediate verification to keep your account secure. Please confirm your account details by clicking the link below within 24 hours to avoid suspension.

Verify Your Account Now

If you do not act, your account access may be limited.

Thank you for trusting Wells Fargo.

Sincerely,

Security Team

Link Target

The hyperlink redirects users to a fake website that looks identical to the bank’s login page. The page prompts users to enter their login credentials and personal information, like their Social Security number or account details.

Why this is so effective

Urgency. Phrases like “Action Required” and “within 24 hours” create a sense of panic.

Brand Spoofing. The attacker replicates the logo, colours, and language style of the bank.

Fake URL. The link appears genuine but directs the user to a malicious site.

Emotional manipulation. It appeals to the user’s desire to secure their account.

Outcome

Stolen login credentials. The attacker gains access to the victim’s bank account.

Potential for financial loss. Unauthorised transactions may occur, and sensitive data like bank account details and personally identifiable information could be sold on the dark web.

This is a classic and dangerous phishing strategy, as it capitalises on human emotions and trust in familiar entities.