eCommerce Fraud Knowledge Guide

Phishing

  1. Articles
  2. eCommerce Fraud
  3. Phishing
  4. Phishing Emails
Phishing

Knowledge Guide Chapters

  1. What is Phishing?
  2. Common Phishing Tactics
  3. Smishing
  4. Phishing Emails
  5. Spear Phishing
  6. Whaling
  7. Vishing
  8. Angler Phishing
  9. Phishing: Statistics & Financial Impact
  10. Phishing Examples
  11. How to Identify Phishing Attacks
  12. Prevent Phishing Scams

Phishing EmailsWhen Email Scammers Target Your Entire Organization

Monica Eaton | December 10, 2025 | 15 min read
What are Phishing Emails?

In a Nutshell

Phishing fraudsters can target your entire company, trying to hook even a few of your employees. Even worse, scammers might hide behind your good name and try to catch unwary consumers. In this post, we look at how crooks create phishing scams, how to recognize attacks, and tips for not becoming a victim.

Where Do Phishing Emails Come From? How Can You Stop Them From Destroying Your Business?

Okay, picture this.

You’re an electronics retailer. You’re in your office checking email when you spot something odd: a message advertising a ridiculously low price on late-model computers.

The offer sounds too good to be true. But, that’s not the weirdest part: the real problem is that the email is allegedly coming from… you.

You open the message. There’s your logo, and the familiar colors associated with your brand. But, the computer being advertised isn’t a brand you sell. You start to click through to the website, but something makes you hesitate. You know the computer isn’t on your site… so where is that link going to take you? And an even better question: how many other people received this same email?

We call this a textbook example of a phishing email.

Today, we’re going to examine why phishing emails are so dangerous to your business. We’ll also explain how your information can be used to create phony messages, and share some tips for detecting when you might’ve been targeted with phishing emails.

Phishing

Phishing involves a scammer attempting to deceive unsuspecting victims into voluntarily divulging sensitive information. An estimated 90% of cyberattacks begin with a phishing attempt. Here’s what you need to know about these attacks and how you can protect yourself.

What is a Phishing Email?

Phishing Email

[noun]/fiSH • iNG • ē • māl/

A phishing email is a fake message that appears to be from a trusted source, but which is used to con people into clicking links, giving up information, or sending money. 

“Phishing” is a trick fraudsters use to scam businesses or individuals into helping them commit cybercrime. Phishing emails are typically sent in bulk to thousands of recipients at a time. The goal is to trick recipients into performing some action — clicking a link, sending money, providing exploitable information — that they normally would not do.

Phishing can be conducted via numerous methods, including via SMS (text) message, a voice message, or social media. But, email is the oldest and more commonly used form.

Most people won’t fall for email phishing, of course. Fraudsters know that only a small percentage of those targeted will bite. That’s why they cast such a wide net; according to recent data, over 3.4 billion phishing emails are sent every single day.  And, even if only a handful of recipients respond, the rewards are worth the effort.

Did You Know?

Despite spam filters and security tools, email continues to be the primary means of phishing, mostly because of its pervasiveness. Over 90% of Americans have an email address, and most have multiple ones.

How Do Phishing Emails Work?

We get so many emails every day, we tend not to exercise as much due diligence as we should. 

A message dressed up like an invoice, bank notice, or customer inquiry can easily blend into the normal flow of daily communication. We may open or respond automatically without double-checking that the sender is who they claim to be.

Below is a textbook example of a phishing email with red flags highlighted:

Example screenshot of a fraudulent phishing email
  1. Urgent or alarming subject line designed to grab your attention immediately.
  2. Misspelled or disguised domain/email address using lookalike characters or unusual domain names (lowercase “L” instead of the uppercase “I”).
  3. Incorrect, outdated, or inconsistent company branding elements.
  4. Generic greeting such as “Dear Customer” instead of using your actual name.
  5. Noticeable spelling mistakes or awkward grammar within the message body.
  6. Suspicious links that lead to fraudulent or unexpected websites.
  7. Unexpected attachments that may contain malware or viruses.

One other thing: the CTA link will connect to the bogus website… but so might other links in the email; the link to unsubscribe, for example, may also redirect to the scam site. In fact, in a majority of cases, the entire page will be one linked image: click anywhere, and the fraudster gets what they want.

How Much Damage Can Phishing Emails Do? Statistics & Case Studies 

In the grand scheme of things, fewer than 18% of recipients will do what the fraudster wants. So, are phishing emails really that big a deal?

Yes. Remember what I said earlier: scammers deliberately cast a wide net to try and trap as many victims as possible. Not convinced? Just check out these stats I’ve compiled below:

3.4
billion

Number of phishing emails sent per month globally.

Source: Keepnet Labs

$100
million

Approximate number of phishing emails Google blocks each day.

Source: Google

$45%

Portion of ransomware infections originating from phishing emails.

Source: IdentityTheft.org

300,487

Number of phishing reports received by the Internet Crime Complaint Center in 2024.

Source: IC3

$4.88
million

Global average cost of a single phishing attack in 2024.

Source: IBM

$2.77
billion

Amount lost to business email compromise scams in 2024.

Source: Salesso

82%

Portion of phishing emails that are generated with AI.

Source: Sift

Still not convinced? Take a look at these real-world examples:

Target

Target (2013)

The Target data breach didn’t start at Target: rather, a cybercriminal phished a small HVAC vendor, then stole their network credentials to access Target’s systems. They then snuck in malware that captured payment card data from checkout terminals. The result? 40 million credit card numbers stolen, 70 million customer records compromised, and $202 million in costs. Target CEO Gregg Steinhafel ultimately resigned as the brand suffered massive reputation damage.

Amazon Logo

Amazon Impersonation Campaigns (Ongoing)

Millions of phishing campaigns are sent monthly, impersonating major ecommerce brands with fake order confirmations, account suspensions, refund notices. Customers lose credentials and payment information, and real merchants face chargebacks when stolen data is used fraudulently.


Did You Know?

There was a 600% jump in phishing attacks during the pandemic. Shipping notifications, delivery problems, and account issues exploited increases in online shopping behavior. Phishers often leverage current events and customer anxieties to their benefit. Meanwhile, merchants get hit with elevated fraud and chargeback volume.

How Criminals Craft Phishing Emails to Impersonate Your Business

TL;DR

Fraudsters target companies, big or small, for impersonation. Smaller firms often lack dedicated security, while trusted brands with loyal customers and frequent communications are considered attractive targets.

“Why me?” you ask?

It’s a fair question: why would fraudsters hide behind your brand when they do their dirty work? According to one report, about half of all brand-impersonation attempts involve a scammer disguising themselves as a major corporation such as Microsoft, Google, or Amazon. So, why do the remaining half other scammers pick on innocent merchants like you?

Several reasons. For starters, small- to mid-sized companies are less likely to employ full time fraud and security people. The big names have the resources to detect an in-progress attack within hours. Targeting you, however, may draw less attention.

If you have great reviews, that’s also a draw. It points to an established customer base that trusts you. If you regularly send out customer communications — coupon offers, newsletters, etc. — your customers won’t even blink at one more email. 

How Scammers Use Their Phishing Emails

Impersonation only works if recipients truly believe that the message is from you. With savvy and AI-powered tools, mimicking your business keeps getting easier.

Slightly misspelled domain names (a practice called “typosquatting”) can deceive users. For example, using “Chargeback911.com” instead of “Chargebacks911.com.” It’s also easy to copy, download, or even recreate most logos. Using specific typefaces help make scam messages match yours. A cybercriminal can even use one of your actual marketing emails as a template, matching colors, styles, tone, and even the writing style.

Once they have a facsimile email (with legitimate information swapped for their fake info), there are a number of phishing attacks cybercriminals can try. Common brand impersonation scenarios include:

  • Fake order confirmations mimic legitimate purchase receipts.
  • Fraudulent password reset requests prompt victims to perform an unauthorized password change.
  • Account suspension warnings claim victims’ accounts will be locked unless they take action.
  • Counterfeit shipping alerts demand more information to deliver a (non-existent) order.
  • Phony refund/credit notices Entice users with fake refunds or account credits.
  • Customer service impersonation attackers pose as support agents from a trusted source.

The end goals here are all the same: con the user to click on a malicious link, make an illegitimate purchase or payment, or input private information such as passwords, financial records, or trade secrets. 

How Phishing Emails Can Impact Your Business 

TL;DR

A single phishing email can trigger massive damage, including data breaches, regulatory penalties, operational disruption, and long-term reputational harm. Customer trust may erode, lawsuits and compliance issues can arise, and recovery takes significant time and effort.

Successful phishing emails can pack a wallop. Just one compromised email can cause cracks that leak a flood of data: payment records, employee passwords or login credentials, trade secrets, and more.

It gets worse. If customer databases are breached, you get the fun job of notifying your customers (more on that in a bit). You’ll make yourself vulnerable to consumer lawsuits. You could also face non-compliance penalties under regulations like GDPR or PCI-DSS.

Then there’s the operational aftermath. Days or weeks spent figuring out what happened, how it happened, and how to keep it from happening again. You’ll need to assess the extent of the damage, which systems were affected, and how to make amends to damaged parties.

Phishing scams can lead to waves of unhappy customers filing chargebacks.

We can help you manage disputes before and after the fact. Contact us to learn more.

Request a Demo
The Original End-to-End Chargeback Management Platform

There can be long-term damage, too, especially when it comes to your reputation. If  crooks scam consumers using your company, the victims will blame you. That means negative reviews and social media backlash. News feeds will amplify the issue, so prospective customers may shy away, too.

The impact “ripple” of email phishing could haunt you for years. There’s no question that prevention is the better option.

How to Identify a Phishing Email

In addition to the obvious design elements we talked about earlier, here are a few more common red flags that could indicate a potential phishing attack. This is information you definitely want to share with your employees.

Sender Anomalies

  • Mismatched email addresses, as we mentioned above
  • Generic sender names (“Customer Service” vs. a specific person)
  • Sender address doesn’t match alleged organization’s website 

Content Warning Signs

  • Urgent or threatening language (“immediate action required”)
  • Generic greetings
  • Poor grammar, spelling errors, awkward phrasing
  • Strange attachments (especially .exe, .zip, .scr files)
  • Requests for sensitive information like passwords, SSN, or card numbers
  • Mismatched branding (logos, colors, or fonts that are slightly off)
  • “Too-good-to-be-true” offers or prizes

Technical Indicators

  • Shortened URLs that hide true destinations
  • Links with IP addresses instead of domain names
  • HTTPS used deceptively
  • Suspicious file attachment extensions
  • Request to disable security software

Context Clues

  • You weren’t expecting this email
  • Claims about accounts you don’t have
  • References to actions you didn’t take
  • Received outside normal business hours
  • Copying unusual recipients

Common Misconceptions About Phishing Emails

It’s getting harder and harder to identify scam emails. Fraudsters are getting more savvy, and AI is helping crooks avoid red flags. So it’s important to look at some of the myths surrounding phishing emails, and parse what is true and what is false.

Fiction: “Phishing emails always contain obvious errors.”
Fact: Modern phishing emails are often polished, with proper grammar and legitimate-looking branding.

Fiction: “Phishing only targets individuals, not businesses.”
Fact: Businesses, especially small- to medium-sized merchants, are increasingly targeted for sensitive data, wire transfers, and brand impersonation.

Fiction: “If it’s from a known contact, it’s safe.”
Fact: You can never be 100% sure that a person sending you a message is who they claim to be. Email accounts — even from within your company — can be compromised or very convincingly spoofed.

Fiction: “Spam filters catch everything.”
Fact: While modern filters are great at stopping email fraud, clever fraudsters still find ways to bypass detection and slip phishing campaigns through the cracks all the time.

Fiction: “I’m safe as long as I don’t click a link.”
Fact: You’re usually safe by not clicking, but older software can still pose risks. While it’s rare, automatically loaded images can potentially reveal exploitable information.

Fiction: “I’m too small (or too smart) to be targeted.”
Fact: Don’t kid yourself. Phishers cast wide nets, trying to catch anyone who might yield value. Individuals, small businesses, or enterprise organizations are all at risk.

Signs That Your Business May Have Been Targeted

TL;DR

If employees notice unusual logins, strange internal emails, or account issues, it could indicate that your business has been targeted by phishing scammers. Customer complaints, social media alerts, and spikes in chargebacks are also signs.

How do you know if fraudsters have your business in their sights? It's good to be aware of tip-offs that can help you detect whether you might've been targeted with phishing emails.

Internal Targeting Indicators

If phishers attack everyone in your company at once, you’ll probably figure it out pretty quickly. Talk to employees about spotting (and immediately reporting) these red flags:

  • Unusual login attempts from foreign locations
  • Unauthorized changes to payment/shipping information
  • Strange email requests from alleged internal executives
  • Unexpected or unfamiliar, attachment-laden emails
  • IT tickets about account access issues

Brand Impersonation Red Flags

If crooks are using your name and logo to scam consumers, it can be harder (but not impossible) to detect. Be on the lookout for:

  • Customer complaints about emails you didn’t send
  • Social media mentions of suspicious emails from “your company”
  • Customers questioning charges for purchases that were “already paid” via email
  • Negative reviews mentioning scam or suspicious emails
  • Unusual spike in chargeback disputes

Technical Omens

Finally, your IT department should watch out for these network or system warning signs:

  • Unexplained data exfiltration
  • Increase in “password reset” requests
  • Abnormal network traffic patterns
  • Unfamiliar devices accessing company accounts
  • Unusual file encryption activity (potential ransomware)

Phishing Email Response Plan: What to Do When Your Brand is Impersonated 

TL;DR

You can’t stop scammers entirely, but you can reduce damage with a 3-step response program.

So, you discover that fraudsters are sending out mass emails claiming to be you. What can you do to stop them?

Honestly? You probably can’t. These scams rarely run for more than a few days. Even if you could track down the culprit, it’s doubtful they’d still be running the bogus operation. Plus, operations like this being run out of the US or Europe are highly uncommon.

While you can’t shut down the scammer, you can reduce the impact. You need an actionable response protocol that’s already in place before the bad guys strike:

Immediate Response (Within 24 Hours)

Immediate Response (Within 24 Hours):

Document Everything: Your first step is always to gather the evidence. Collect screenshots of phishing emails (including headers) along with any associated domains or URLs.

Get a copy of fake website pages using archive.org. Document any potentially legitimate contact information, like phone numbers. Collect any customer comments (good or bad) you find on social media, review sites, Better Business Bureau, and so on.

Alert Your Customers: Phishing email attacks can become a PR crisis. To get ahead of the damage, quickly post an explanation and security advisory on your website, then email customers with an apology and share updates on social media. Oh, and update your FAQs to tell how you communicate with customers, and legitimate ways customers can contact you.

Notify Key Partners: Your company may be the eye of the phishing scam, but the storm will spread.

Telling you partners — bank, payment processor, web hosting company, security companies, and more — could even be harder than apologizing to customers. Vendors and suppliers, especially, may be afraid any bad media attention could rub off on them. You’ll need to outline what you plan to do going forward to keep them safe.

Report to Authorities: As we said, authorities are typically helpless in any specific case, but it's still good to report what happened. Your information will be added to any other complaints they’ve received and may strengthen a case against the perpetrators. If nothing else, they’ll be able to warn other merchants. You can also contact your State Attorney General; if you feel the culprits are near you, consider calling local law enforcement.

Important!

There are multiple agencies to which you can report fraud attacks. The FBI Internet Crime Complaint Center(IC3), the Federal Trade Commission, and the Anti-Phishing Working Group,/a> are all options.

Containment Actions (Within 1-7 Days)

Containment Actions (Within 1-7 Days):

Takedown Procedures: After all direct notifications are sent,  it's time to expand your efforts. Report fake sites to hosting providers and file abuse complaints with domain registrars. Make sure phishing databases are aware of the situation.

You should also request removal from web browsers (Google Safe Browsing, Microsoft SmartScreen), and alert email providers like Gmail, Outlook, and Yahoo. 

Internal Security Audit: Carelessness, security missteps… or malicious behavior? You can't ignore the fact that part of the attack could have come from within. Once things have calmed down, you’ll need to do a comprehensive internal audit:

  • Check for any actual breaches: Did scammers only pretend to be from your company? Or did they actually gain access to your systems and data?
  • Review access logs for suspicious activity: Check for signs of system compromise like failed logins attempts, spikes in traffic, or unexpected access changes.
  • Validate employee accounts: Verify email and system accounts to assure they haven't been hacked, which could still allow access to your systems.
  • Confirm customer database security: Triple-check and lock down any stored customer data in case personably identifiable information was leaked.
  • Test email authentication: This includes protocols like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting & Conformance)

Customer Communication & Education: While your plan should be in place ahead of an attack, this is a perfect time to focus on education for your customers.

Address common phishing scenarios on your website. Initiate contact with recently active customers, and offer regular status updates. You should standardize the way you respond to customers (we’ll talk more about that in a minute).

Communication as Prevention

Keeping customers informed can help prevent future chargebacks. Chargebacks911® can help you with all types of fraud protection. Click here to request a demo.

Long-Term Prevention (Ongoing)

Long-Term Prevention (Ongoing):

You don't want to have to go through this again, do you? Take the time to implement tools and techniques for long-term prevention.

Technical Safeguards: Scammers can’t register domains similar to yours if you’ve already got them. Holding multiple registered domains is way cheaper than a successful attack.

Keep track of any newly registered domains that resemble yours. As another tip, use Brand Indicators for Message Identification (BIMI) to display your company’s logo next to your authentic emails in a recipient’s inbox. 

Brand Protection: You can’t watch all potential attack activity by yourself. So… get help.

Trademark monitoring services alert you to suspicious or unauthorized use of your registered trademarks. Domain squatting watch services do something similar for new domain registrations similar to your brand. There are even services that track dark web activity.

Customer Education: As we mentioned earlier, this is a great opportunity to sneak a little fraud education onto your site. Add phishing questions to your FAQ, or create a “How to Spot Fake Emails” resource page. Be sure to regularly spell out what you’re actually doing to make sure this doesn’t happen again.

How to Notify Your Customers of Impersonation Scams

TL;DR

Notifying customers about impersonation scams is essential. Communicate the situation clearly, apologize, and focus on preventing future issues. Notifications can be delivered via email or social media, using templates to ensure clarity and consistency.

Sending notifications of impersonation scam attacks is non-negotiable; you simply have to do it. Period.

It can be tricky, though. On the one hand, you want to convey the issue as clearly as possible. On the other hand, you don’t want to say anything that could potentially be used against you. You need to own it, but you don’t want to sound like you’re to blame. Apologize for what happened, but focus on looking to the future.

Important!

Be sure to check with your legal representatives before sending notifications.

Ultimately, how you notify customers will be up to you. To help you out, though, here are a couple of templates — one for email, one for a social media post — that you can use to notify customers after learning you’re being impersonated.

Customer Advisory Email:

We’ve been made aware that scammers are sending phishing emails impersonating [Your Company]. These fake emails may request personal information or payment details.

Please remember: we will NEVER ask for passwords, credit card numbers, or other sensitive information via email. If you receive a suspicious email claiming to be from us, do not click any links or provide any information. Instead, please forward it to [security email], then delete it.

Social Media Post Template:

Please be aware that phishing emails impersonating [Your Company] have been sent to some of our customers. We’ll never ask for passwords or payment via email. For more information or to report a suspicious message contact [security email].

Fighting Phishing: Stay Vigilant and Proactive

The most effective tools to defend against phishing scams are education and vigilance. There's no point where it's safe to slack off on awareness, monitoring, and maintaining your response plan. People inside and outside your company should know and understand the warning signs that could indicate an attack.

That said, attacks may still get through, and flood you with unnecessary chargebacks. That's when it's time to call in the experts at Chargebacks911, who can help you manage disputes no matter where they come from. Contact us to learn more.

FAQs

What is phishing?

Phishing is a form of cybercrime where attackers send fraudulent emails designed to trick recipients into revealing sensitive information like passwords, credit card numbers, or bank account details. These emails typically impersonate legitimate organizations and use urgency or fear tactics to manipulate victims into taking action. For merchants, phishing attacks can target both employees and customers, leading to data breaches, fraud, and chargebacks.

How do I know if an email is phishing?

Look for red flags including: mismatched sender addresses, urgent or threatening language, poor grammar, suspicious links or attachments, and requests for sensitive information. Always verify unexpected emails by contacting the sender through official channels. Hover over links without clicking to preview the actual destination URL. If an email creates urgency or seems "off," trust your instincts and investigate before taking any action.

What's the difference between phishing and spear phishing?

Phishing typically involves mass emails sent to thousands of recipients, hoping a small percentage will fall victim. Spear phishing is highly targeted, with attackers researching specific individuals or companies to craft personalized, convincing messages. Spear phishing is more dangerous because the personalization makes emails appear legitimate, resulting in much higher success rates—often above 50% click-through rates.

What happens if I click on a phishing link?

Clicking a phishing link may direct you to a fake website designed to steal your login credentials or payment information. It may also download malware to your device, giving attackers access to your system, files, or stored information. If you accidentally click a phishing link, immediately disconnect from the internet, run a security scan, change your passwords, and notify your IT department or security team.

Can phishing emails cause chargebacks?

Yes, absolutely. When phishing attacks compromise customer payment credentials, fraudsters can make unauthorized purchases that result in chargebacks against your business. Additionally, if your brand is impersonated in phishing campaigns and customers become confused, they may dispute legitimate transactions. Employee phishing can also lead to account takeovers resulting in fraudulent orders and chargebacks.

How do I report phishing emails?

Forward phishing emails to the Anti-Phishing Working Group at reportphishing@apwg.org. Report to the FBI's Internet Crime Complaint Center (IC3) at ic3.gov. If the email impersonates a specific company, report it to their security team. Within your email client (Outlook, Gmail), use the "Report Phishing" or "Report Spam" button. Keep the original email as evidence—don't just forward it; include it as an attachment to preserve headers.

What should I do if my business is impersonated in phishing emails?

Immediately document the phishing campaign with screenshots and URLs, then alert your customers through official channels about the impersonation. Report it to the FBI (IC3), FTC, and Anti-Phishing Working Group (APWG). Work with hosting providers and domain registrars to take down fake sites. Update your website and social media with security advisories. Implement email authentication protocols (SPF, DKIM, DMARC) to help prevent future spoofing.

How can I protect my business from phishing-related chargebacks?

Implement strong employee training programs to prevent credential compromise, use multi-factor authentication on all accounts, deploy fraud detection tools, and maintain clear transaction descriptors. Subscribe to fraud alert services (Ethoca, Verifi) to catch fraud before chargebacks occur. Educate customers about your actual communication methods so they can distinguish real emails from phishing. Keep detailed documentation to dispute illegitimate chargebacks.

Are phishing emails illegal?

Yes. Phishing is illegal under federal laws including the CAN-SPAM Act, Computer Fraud and Abuse Act, and Identity Theft and Assumption Deterrence Act. Penalties can include significant fines and prison sentences. However, many phishing operations originate from countries with limited cooperation with U.S. law enforcement, making prosecution challenging. This is why prevention and defense are more effective than relying on legal remedies.

How is AI changing phishing attacks?

AI is making phishing attacks more sophisticated and harder to detect. Attackers use AI to generate grammatically perfect, contextually relevant emails at scale. AI tools can scrape public information to personalize attacks, create convincing fake websites, and even generate deepfake audio for vishing attacks. Defense must also evolve: AI-powered email security solutions can detect subtle patterns and anomalies that humans might miss.

Next Chapter

Spear Phishing

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form
Embed code has been copied to clipboard