This could be a super-easy way to spot spam emails

Spam messages
(Image credit: Shutterstock)

Spam and phishing emails can be dangerous, as they often lead to more devastating cyberattacks. However researchers from Atlas VPN have found some common denominators for threat actors distributing spam and phishing emails, which targets could use to spot these emails early on and avoid more serious threats.

According to the Expel Quarterly Threat Report Q1 2022, the vast majority of malicious emails (67%) have a blank subject line. No names, no calls to action, just blank space. 

While getting an email with a blank subject line can be treated as a “major red flag”, it’s not the only thing scammers are doing. A tenth of emails (9%) have “Fax Delivery Report” for the subject line, as well. Other notable mentions include “Business Proposal Request”, “Request”, “Meeting”, “You have (1) New Voice Message”, “Re: Request”, “Urgent Request”, and “Order Confirmation”.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Spelling and grammar mistakes

Every email with one of these (or a variation of) should be treated as suspicious, right from the get-go. 

There are other ways to spot malicious emails, as well, researchers further uncovered. Most of the threat actors distributing these messages come from non-English speaking communities, oftentimes resulting in emails marred with grammar and spelling errors. Email address domain should also be monitored, as no legitimate organization will send out emails from public domains, such as Hotmail, or Gmail. 

And finally, no legitimate business will ask for private, or otherwise sensitive information, via email. If the email received carries a link, or an attachment, calling the victim to share their personal data, it’s almost absolutely an attempted fraud. 

Due to its ease of use, low cost, and wide reach, email remains one of the most popular attack vectors for threat actors everywhere. Almost all of today’s data breaches started with the theft of sensitive data from an endpoint, done through phishing emails. 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Help! We're drowning in email spam, it's about to get worse and there's nothing we can do to stop it
email
Hidden text "salting" is letting hackers craft devious email attacks to evade detection
Shopping scams
New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Latest in Security
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Latest in News
European Union technical background
EU tech companies push for digital sovereignty, reducing reliance on US and others
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
Star Wars Knights of the Old Republic
Knights of the Old Republic remake developer Saber Interactive states all its projects are 'still in development'
google nest
Google is slowly phasing out its Assistant helper to make room for Gemini's reign in smartphones - here’s how it’s doing the same for smart home devices
Renault 5 Turbo 3E
Renault unveils its wildest EV to date and it comes with in-wheel motors and a rally-style vertical handbrake for drifting
Circular smart ring
Circular's new smart ring is getting blood pressure and blood glucose monitoring before the Apple Watch