How to Spot a Phishing Email in 2026

AI-generated phishing emails are now grammatically perfect and highly personalised. The old advice of "look for spelling mistakes" is no longer enough. Here are the red flags that still work.

How to spot a phishing email red flags illustration
1Sender Analysis

Analysing the Sender: The First and Most Reliable Check

The sender's email address is the most reliable single indicator of a phishing email, but it requires careful inspection rather than a glance at the display name. Attackers frequently set the display name to a trusted organisation's name while using a completely different underlying address — "HSBC Security Team" <[email protected]> looks convincing at a glance but reveals its fraudulent nature when the actual address is examined. In email clients on both desktop and mobile, tap or hover on the sender name to reveal the actual sending address.

Even when attackers use a domain that looks similar to the legitimate one, careful inspection reveals the difference. Common techniques include: typosquatting (hsbc.com vs. hsbcc.com or hsdc.com); lookalike characters using Unicode homoglyphs that appear identical to standard letters but are different characters; adding words to legitimate domains (hsbc-security.com, verify-hsbc.com); using legitimate-looking subdomains on fraudulent domains (hsbc.com.attacker.net — the authoritative domain here is attacker.net, not hsbc.com); and using top-level domain variations (hsbc.hk vs. hsbc.com).

For emails claiming to be from local Hong Kong organisations, check against the official domain. HSBC HK uses @hsbc.com.hk and @hsbc.hk. The Hong Kong government uses @[department].gov.hk. Legitimate Octopus communications come from @octopuscards.com. Any variation from these official domains should be treated as suspicious. When in doubt, go directly to the organisation's official website (typed directly into the browser, not clicked from the email) and check for any notifications in your account portal.

  • Check the actual address: Tap or hover the sender name to reveal the real address — display names are completely spoofable
  • Domain examination: The authoritative domain is the rightmost portion before the TLD — hsbc.com.attacker.net is attacker.net
  • Typosquatting: One character difference from a legitimate domain — requires careful character-by-character inspection
  • HK official domains: gov.hk for government; official bank domains in @hsbc.com.hk format
  • Word additions: -security, -verify, -alert appended to real domain names are a common tactic
  • Independent verification: Navigate to the official site directly rather than trusting any link in the email
How to read email headers to detect spoofing →
Analysing email sender addresses for phishing detection
2Content Red Flags

Red Flags in Email Content and Links

Urgency and threats are the most consistent psychological hallmarks of phishing emails. Legitimate organisations rarely threaten immediate severe consequences in emails and do not demand that you take action within hours or face account suspension, arrest, or financial loss. Messages claiming "Your account will be permanently deleted in 24 hours unless you verify your details", "You are under investigation — act now Hong Kong: Types and How to Avoid">to avoid arrest", or "Unclaimed package will be returned — update delivery information immediately" are all using urgency to short-circuit careful thinking.

Requests for sensitive information are another major red flag. Legitimate banks, government departments, and reputable services do not ask you to provide your full password, PIN, HKID number, complete credit card details, or two-factor authentication codes via email. No legitimate organisation sends a link to a page asking you to enter your current password. If an email asks you to confirm, verify, or update your credentials by clicking a link and entering details on the linked page, treat it as highly suspicious regardless of how official it appears.

Link inspection is critical. Hover over any link in an email before clicking — on desktop, the actual URL appears in the browser's status bar; on mobile, hold the link to see the actual URL in a preview. The URL shown in the email text (the link's visible text) can be completely different from the actual destination URL. Look for the actual domain in the URL — subdomain tricks, long URLs with legitimate-looking text before the actual domain, and URL shorteners are all tactics used to disguise phishing destinations. When in doubt, do not click: navigate to the site directly.

  • Urgency and threats: "Act now or your account will be closed" — legitimate orgs rarely issue ultimatums via email
  • Requests for sensitive data: No legitimate service asks for passwords, PINs, or 2FA codes via email
  • Hover over links: Check the actual URL in the status bar before clicking — it often reveals the true destination
  • URL shorteners: bit.ly and similar services hide the true destination — treat shortened links with extra caution
  • Generic greetings: "Dear Customer" rather than your name — mass phishing often lacks personalisation
  • Unexpected attachments: Attachments from unexpected senders, especially .exe, .zip, or Office files with macros
How social engineering is used in phishing →
Red flags in phishing email content and links
3AI-Enhanced Phishing

Why AI Makes Modern Phishing Harder to Spot

The traditional advice to look for spelling mistakes and poor grammar as phishing indicators has become significantly less reliable. AI language models including ChatGPT and its successors can generate native-quality text in any language on demand, at essentially zero cost. Phishing campaigns now routinely use AI-generated content that is grammatically perfect, contextually appropriate, and stylistically similar to genuine communications from the impersonated organisation. The days when a poorly worded email was a reliable red flag are largely over.

AI also enables personalisation at scale. Attackers can combine AI writing with data scraped from social media and breach databases to generate personalised phishing emails that reference your name, your employer, your recent purchases, your bank, and even your colleagues — information that previously required significant manual research to compile. This collapses the distinction between mass phishing and spear phishing, making high-quality personalised attacks available to lower-sophistication attackers at minimal cost.

Voice cloning technology adds another dimension to vishing attacks. AI voice cloning can create convincing audio impersonations of known individuals — including CEOs, senior managers, and family members — from a few minutes of publicly available audio. These cloned voices are now being used in vishing attacks where a fake voice call from an apparent superior or trusted contact directs the victim to authorise a payment or share credentials. The technical barrier for these attacks has fallen dramatically, and they are increasingly reported in Hong Kong business environments.

  • Grammar is no longer reliable: AI generates perfect grammar in any language — old warning sign no longer works
  • Personalisation at scale: AI enables mass-produced personalised phishing — every email can include your name and context
  • Voice cloning: AI-generated voice calls impersonating known individuals — emerging vishing threat in HK
  • Focus on structure, not grammar: Scrutinise the sender domain, the link URL, and the request type — not just the writing quality
  • Out-of-band verification: Unexpected financial requests — call back independently to verify, even if the voice sounds familiar
  • Context awareness: Would this organisation actually contact you this way about this issue? — think about what is normal
How targeted spear phishing attacks work →
AI-generated phishing emails harder to detect
4What to Do Next

What to Do When You Suspect a Phishing Email

When you receive an email that triggers suspicion — whether through a recognised red flag or simply a gut feeling that something is wrong — the correct response is to pause and verify rather than dismiss or act immediately. Do not click any links, download any attachments, or provide any information. Take a moment to examine the sender address carefully, then independently verify the communication's legitimacy through an official channel you locate yourself rather than one provided in the email.

If the email claims to be from your bank, call the number on the back of your card or navigate directly to the bank's official website by typing the URL yourself. If it claims to be from a government department, look up the official contact information on a government website you navigate to directly. If it claims to be from a colleague or supplier, call them on a known number. In no case should you use any contact information (phone number, website link, email address) provided within the suspicious email itself — these will be controlled by the attacker.

Report the phishing email to help protect others. Forward suspected phishing emails to your email provider's abuse address ([email protected] for Gmail, [email protected] for Outlook). Report to HKCERT via hkcert.org/report. If the email impersonates a specific Hong Kong organisation, forward it to that organisation's security or fraud team so they can warn their customers and get the phishing infrastructure taken down. Even if you were not fooled, reporting ensures others have a better chance of recognising the same attack.

  • Do not click or respond: Pause — do not click links, download attachments, or reply to suspicious emails
  • Verify independently: Find the organisation's real contact information through your own navigation — never from the email
  • Call your bank directly: Use the number on your card or the bank's official website, not any number in the email
  • Report to HKCERT: hkcert.org/report — helps get phishing infrastructure taken down
  • Forward to email provider: Gmail's report phishing, Outlook's report phishing — improves filters for everyone
  • Notify the impersonated organisation: Tell the real organisation so they can warn their customers
Where and how to report phishing in Hong Kong →
What to do when you suspect a phishing email

Train Your Eye to Spot Phishing Before You Click

The best defence against phishing is consistent vigilance — check sender addresses, preview URLs, and verify unexpected requests through independent channels.

Related VPN Articles