(916) 972-9000 info@connectech.us

Your Company’s Name and Identity are Being Used in a Phishing Attack. What Now?

Phishing is an attempt to obtain private information such as usernames, passwords, security questions, and credit card details for malicious purposes. Phishing attacks happen most frequently via email that looks like it’s been sent from a trusted source. While it’s critical to educate email users about phishing, including how to identify and deflect malicious messages they receive, in many phishing attacks there’s another victim: a legitimate company whose name and identity are being used to send the email.

How should a company or organization respond if their business is impersonated in a phishing scam? Unfortunately there’s not a single method for shutting down phishing attacks, but companies do have a number of ways to fight back.

1. Contact your clients and customers by email or snail mail to let them know that fraudsters are impersonating your business. Tell them to ignore suspicious emails that appear to come from your company, and remind them that your business would never solicit private information, such as passwords or credit card info, via email. If your company has a social media presence, use the platform to share details about the scam. The goal of any phishing attempt is to obtain personal data, so letting your clients know you’ve been targeted by phishers can help ensure fewer people will fall for a scam, which may encourage the phishers to move on.

2. Contact law enforcement.  If you learn of a phishing scam impersonating your business, report it to the FBI’s Internet Crime Complaint Center.

3. Learn how to view an email message’s full header, which will be necessary when reporting or forwarding phishing emails to the organizations listed below. A message’s full header will show where the email originated, and it traces the server path from sender to recipient. If you are a gmail user, follow these instructions to view the full header. In Apple Mail, follow these instructions. In Outlook, follow these instructions.

4. Forward deceptive messages to the Federal Trade Commission at spam@uce.gov.

5. Report phishing emails impersonating your business to the Anti Phishing Working Group, an industry, law enforcement, and government coalition focused on cybercrime.

6. Report phishing to PhishTank, a collaborative clearinghouse for data and information about phishing on the Internet.

7. If you’re a gmail user, learn how to mark email as spam and report phishing to Google, and be sure to do it every time you receive suspicious email.

8. If the phishing sender is using a gmail address, report the gmail abuse to Google. If you receive what appears to be a phishing email from Apple, forward it to reportphishing@apple.com. To forward phishing scam messages to Microsoft, email phish@office365.microsoft.com.

9. Consumers can file a complaint with the FTC. (This complaint process is just for individuals, not businesses, so you’ll need to ask your clients for assistance.) If your complaint is against a company outside the United States, file it at econsumer.gov.

10. If you believe you’ve found a phishing site on the web, report the phishing page.

11. Use the phishing episode as reminder to update your company’s security practices. This is an ideal time to review and update your security policies and procedures, including changing passwords and implementing two-step authentication for devices. Contact your internal IT support team, or Connectech, to learn how to authenticate your company’s Internet domain, which will ensure that legitimate email sent by your company isn’t flagged as spam on the recipient’s side. And provide training to all employees and volunteers about phishing scams and how to identify them, so they are less likely to become victims.


For G Suite users: The Super Admin for your account can configure additional protection for Gmail. In the Admin Console, choose Apps, G Suite, Gmail and then click on Safety. This is where the additional layers of protection options are offered. Learn more about the different options by visiting https://support.google.com/a/answer/7577854?hl=en. Please note that all G Suite editions have access to configure these settings, however only the Enterprise edition allows admins to view charts and affected emails. We also have the ability to configure these settings on your behalf, so please let us know if you’d like our assistance with it.

For assistance in evaluating or implementing security solutions on your personal or business devices, please call us at (916) 972-9000, email info@www.connectech.us, or complete the form below.

7 + 2 =