Security Awareness · Aquarium Investments IPS

Don't Take The Bait.
Phishing Guide.

Phishing is the most common attack vector used against financial organisations. This guide covers how to identify, avoid, and report phishing attacks across every channel — email, links, SMS, phone, and social engineering.

Email Phishing
Malicious Links
Smishing
Vishing
Social Engineering
Spear Phishing
The Basics
What Is Phishing?

Phishing is a social engineering attack where criminals impersonate trusted entities — colleagues, banks, software providers, or AQRM itself — to trick you into revealing credentials, transferring money, or installing malware. Attackers do not need to hack our systems if they can hack you instead.

Most Common

Email Phishing

Bulk emails impersonating trusted brands. The attacker casts a wide net hoping someone clicks. Usually contains urgency, a fake link, or a malicious attachment.

High Risk

Spear Phishing

Targeted attacks using your name, role, or company details. The attacker researches you on LinkedIn before sending. Far more convincing — and far more dangerous — than generic phishing.

Internal Threat

Business Email Compromise

Attacker impersonates a colleague, manager, or CEO. Often requests urgent wire transfers or login credentials. Accounts may be genuinely compromised — verify all unusual financial requests by phone.

Mobile

Smishing (SMS)

Phishing delivered by SMS. Often impersonates banks, delivery services, or IT teams. Messages typically contain a shortened URL hiding the real destination.

Phone

Vishing (Voice)

Attackers call you directly, impersonating IT support, banks, or regulators. They use pressure and authority to extract passwords or remote access. Your IT team will never call asking for your password.

Executive

Whaling

Spear phishing specifically targeting senior executives or high-value employees. Attackers invest significant time crafting highly personalised, convincing attacks — including fake legal notices or regulatory correspondence.

Real Examples
Email Phishing — Spot the Difference

These examples show realistic phishing emails you may receive, annotated with exactly what to look for. Compare them against legitimate counterparts.

⚠ THE HARDEST TRICK TO SPOT — CHARACTER SUBSTITUTION

Attackers replace letters with near-identical character combinations. The most dangerous is 'rn' replacing 'm' — at normal reading speed they are virtually indistinguishable, especially in email address fields where people rarely look closely.

✅ REAL ADDRESS
david@microsoft.com
m = genuine letter m
at real email client size →
david@microsoft.com
❌ PHISHING ADDRESS
david@rnicrosoft.com
rn = two letters, not m
at real email client size →
david@rnicrosoft.com
ZOOMED IN — CAN YOU TELL THEM APART?
m
genuine 'm'
vs
rn
'r' + 'n' disguised as 'm'
In a Georgia or Times New Roman font at normal size, 'rn' and 'm' are almost pixel-perfect matches. This is why you should never read an email address quickly — always verify character by character when anything financial or sensitive is involved.
OTHER COMMON CHARACTER TRICKS
Il
capital I → lowercase l
o0
letter o → number 0
i1
letter i → number 1
vvw
two v's → letter w
cld
c + l → letter d
аa
Cyrillic а → Latin a
HOW IT LOOKS IN A REAL EMAIL CLIENT — COULD YOU CATCH IT?
PHISHING — As it appears in your inbox at normal reading size:
From Microsoft Account Team <david@rnicrosoft.com> ⚠ FAKE
To you@aqrm.com
LEGITIMATE — The real Microsoft address for comparison:
From Microsoft Account Team <david@microsoft.com> ✓ REAL
🔍
Spot the difference — look very carefully at the domain:
microsoft
genuine — one letter m
vs
rnicrosoft
fake — 'r' + 'n' before icrosoft
At the size email clients display sender addresses — typically 13–14px — 'rn' and 'm' are almost impossible to distinguish without zooming in. Most people never inspect the sender address carefully. This is exactly what attackers rely on.
❌ PHISHING EMAIL — IT Impersonation
✅ LEGITIMATE EMAIL — Real IT communication looks like this
❌ BUSINESS EMAIL COMPROMISE — CEO Fraud
Attack Scenarios
Real-World Phishing Scenarios

These scenarios are based on real attacks against financial firms. Understand how they unfold so you can recognise them before it is too late.

📩

The IT Helpdesk

Email phishing · Credential theft

You receive an email from 'AQRM IT Support' saying your OneDrive storage is full and you must log in to clear it within 12 hours or lose access to your files.

"Your OneDrive is at 100% capacity. Click below to manage your storage before your files are locked."
Sender domain doesn't match aqrm.com
Artificial urgency — 12-hour deadline
Login link goes to a non-Microsoft domain
IT never sends storage alerts with login links
💼

The New Invoice

Supplier impersonation · Financial fraud

You receive an email from a known supplier saying they have updated their banking details and asking you to use a new account for the next payment — which is due soon.

"Please update your records — our bank account has changed effective immediately. Please do not use the old details."
Sender email is subtly different from the real supplier
No formal letter on headed paper — just an email
Urgency to switch accounts before you can verify
Call the supplier on their known number (not one in the email) to confirm
Any banking change must be verified in person or by voice call before processing
🔗

The Shared Document

SharePoint / OneDrive impersonation

You receive a Microsoft-branded notification saying a colleague has shared a document with you. The email looks exactly like a real SharePoint notification — right down to the Microsoft logo and formatting.

"[Colleague Name] shared 'Q3 Portfolio Review.pdf' with you. Click Open to view."
Hover over 'Open' — URL is not sharepoint.com or onedrive.com
You were not expecting this document
Clicking opens a fake Microsoft login page to steal your credentials
Message the colleague directly via Teams to confirm they shared it
Log into SharePoint directly at aqrm.sharepoint.com — don't use the email link
📱

The Bank SMS

Smishing · Account takeover

You receive an SMS appearing to be from your bank or a payment provider, warning of a suspicious transaction and asking you to verify via a link.

"ALERT: Suspicious transaction of €3,200 detected. Verify now or your card will be blocked: bit.ly/xK9mR2"
Shortened URL hides the real destination
Banks never send verification links by SMS — they call you or use their official app
Urgent threat of card blocking creates panic
📞

The IT Call

Vishing · Remote access fraud

Someone calls you claiming to be from AQRM IT or Microsoft support. They say there is a critical problem with your computer and they need remote access to fix it immediately.

"Hi, this is Tom from AQRM IT. We've detected malware on your machine. I need you to install AnyDesk right now so I can clean it remotely."
IT never calls asking you to install remote access software without prior agreement
Microsoft never proactively calls customers about viruses
If you grant access, the attacker owns your machine and everything on it
Hang up. Call IT directly on the known internal number to verify.
Never install software at the request of an unsolicited caller.
💬

The Teams Message

Internal platform impersonation

A Teams message arrives from someone with a name similar to a colleague or manager, asking you to complete a quick task — usually clicking a link or sharing a file.

"Hey, quick one — can you review this contract before end of day? [suspicious link] Don't reply to my email today, mailbox is full."
Check the sender's profile photo and full email — compromised or fake accounts have subtle differences
'Don't reply to my email' blocks your ability to verify through a second channel
Call the colleague directly to confirm before clicking anything
Mobile & Phone
SMS, Voice & Messaging Attacks
Smishing

SMS Phishing

Fraudulent SMS messages impersonating banks, couriers, tax authorities, or IT. Always contain a link or a phone number to call. Shortened links hide the real destination — never click without expanding first.

Vishing

Voice Phishing

Callers impersonating IT, banks, or authorities. They create urgency and use technical language to seem credible. They may know your name and basic details from LinkedIn. Never grant remote access or share OTP codes.

WhatsApp / Telegram

Messaging App Attacks

Attackers clone colleague or management profiles on WhatsApp/Telegram using their photo and name, then contact you with urgent requests. Company business is never conducted via personal messaging apps.

Quick Reference
The Phishing Checklist

Before acting on any email, link, call, or message — run through these checks. When in doubt, do not click. Report instead.

🔴 Red Flags — Stop and Report

⚠️Sender domain doesn't exactly match the company
⚠️Urgent language: 'Act now', '24 hours', 'Account suspended'
⚠️Hover URL doesn't match the displayed link text
⚠️Generic greeting: 'Dear User', 'Dear Customer'
⚠️Request for password, OTP code, or remote access
⚠️Request for unusual financial transfers outside normal process
⚠️Demand for secrecy: 'Don't tell anyone', 'Confidential'
⚠️Unexpected attachment — especially .zip, .exe, .docm files
⚠️Poor grammar, spelling errors, or inconsistent formatting

🟢 Safe Signals — Legitimate emails typically...

Use the exact company domain — @aqrm.com, @microsoftonline.com
Address you by your first and last name
Do not require urgent action — provide information or notice
Never ask for your password, MFA code, or remote access
Hover URLs point to known, expected domains
Can be verified by contacting the sender through another channel
Attachments are expected and relevant to your work
Do not ask you to bypass normal approval processes
You can find the same information by logging into the service directly
Action
What To Do If You Suspect Phishing
🛡️

Stop. Don't click. Report immediately.

If you receive a suspicious email, SMS, call, or message — do not click any links, do not download attachments, do not reply, and do not provide any information. Report it to IT immediately. Even if you are unsure — report it. A false alarm costs nothing. A missed phishing attack can be catastrophic.

If you have already clicked a link or entered credentials: disconnect from the network immediately, do not turn off your computer, and call IT directly now.

1️⃣
Do not click
Stop what you are doing. Do not interact with the suspicious message in any way.
2️⃣
Screenshot it
Take a screenshot of the email, SMS, or message including the sender address. This helps IT investigate.
3️⃣
Report to IT
Forward the email to informationtechnology@aqrm.com or call IT directly. Include your screenshot.
4️⃣
If you clicked
Disconnect from Wi-Fi immediately. Do not power off. Call IT at once. Time is critical.
5️⃣
Delete the message
After reporting, delete the email or message. Do not forward it to colleagues — this spreads the attack.
6️⃣
Never feel embarrassed
Phishing attacks are professionally crafted by skilled criminals. Reporting is always the right action.
Required · All Employees
Security Awareness Acknowledgement

Please complete the form below to confirm that you have read and understood this phishing awareness guide. Your response is logged automatically with a timestamp and counts toward your security training record.

If the form does not load below, click the button to open it in a new tab.

Open Form ↗

Your response is recorded automatically. If you experience any issues submitting this form contact informationtechnology@aqrm.com.