No Location

It looks as though you are using Microsoft Internet Explorer which is no longer supported. To experience this site in the way it was designed, please upgrade to Microsoft Edge


Anatomy of a Phishing Attack: Don’t Take the Bait


Anatomy of a Phishing Attack: Don’t Take the Bait

  • 09/06/2021
  • Innovation for Ageing, Culture & Society

This blog post has been submitted by our US partner, a nonprofit with the mission to expand the work horizon for women 45+ through tech focused learning opportunities, resource sharing and community building.

The author David Miller, who is serving a fellowship with, retired from government service in 2018. He currently works with a software company in Charlotte, North Carolina. The views, thoughts, and opinions expressed in the text belong solely to the author, and not necessarily to the author's past or present employer, organization, committee or other group or individual.

Anatomy of a Phishing Attack: Don’t Take the Bait

The email arrived in my wife’s inbox on a very average Thursday evening. She was relaxing on the couch with the dogs, going through the 1,637 unread emails in her personal email account. At the top of her inbox was an email from iTunes; it arrived just after she sat down.

The email notified her that an app, one she didn’t immediately recognize, would automatically renew, and she would be charged $100 if she did not act right away. In fact, the renewal date was that very day.

Although she didn’t remember subscribing to this app, it was possible. With all the in-app purchases she’d made over the last few months, she could’ve done so in error; mistakes happen. Given the urgency – the renewal date was that very day, right? – and the fact that $100 was at stake, she clicked the link to cancel the subscription.


The email, emblazoned with the Apple logo, suggested that this app was purchased through the App Store. The link she clicked led her to a website with a login screen which requested her Apple ID and password. She obliged. Oddly, nothing happened when she hit return. Ten minutes later, she forwarded the email to me. adding that she was confused since the app was not listed in her App Store subscriptions on her phone.

Her confusion was warranted: the email was a phishing attack, an attempt by a hacker to convince her to give up her Apple ID and password. Unfortunately, the attack was successful.

While the attack itself was successful, the consequences of the attack were mitigated by a few good cyber hygiene practices she employed:

  1. She has a good awareness of the online threats to her personal information,
  2. She uses strong, unique passwords for her online accounts, and
  3. She activates multi-factor authentication on many of her accounts.

First, despite clicking on the link, she is usually a smarter-than-your-average-bear target. As a geek dad, I send my family occasional “Phamily Phishing Phriday” texts with examples of attempted attacks I get in my personal accounts via email (“phishing”), text (“smishing”), and voice (“vishing”). When I encounter a suspicious message, I take a screenshot of the attempted attack, mark it up by circling the red flags, and send it along with some commentary to our family chat. I know, I know, really pegging the Geek Meter here.

Pegged Geek Meter or not, however, statistics suggest that consistent and frequent reminders of good cyber hygiene practices are better than one-and-done approaches. Remember when organizations used to conduct “annual” cyber awareness training? Nowadays, more and more organizations have moved toward frequent education-based approaches often including random phishing tests. The latter is a better approach.

Recognizing her mistake within minutes after clicking the link and then emailing me, likely decreased the potential severity of this attack.

Second, she uses a password manager to create – and remember – strong passwords. The password manager allows her to use unique, strong passwords for every online account she has. Plus, she never has to remember a password. The app remembers it for her.

Third, she uses multi-factor authentication, or MFA, also referred to as two-factor authentication, or 2FA, for all accounts that offer it. In addition to a user ID and a password, accounts protected with MFA adds an additional layer of authentication beyond the user ID and password, often a PIN or a randomly generated one-time code.

The random code is often sent to the user’s verified mobile number via a text message, although some services allow the codes to be sent to the user’s verified email account. Another way to receive these one-time codes is to use an “authenticator app” like Microsoft Authenticator, Google Authenticator, or Authy.

Now, even though these three things decreased her exposure, we weren’t out of the woods. She had entered her Apple ID and password into the hacker’s fraudulent website.

To mitigate this damage, we navigated to the Apple ID website by entering the address directly into the browser address bar, logged into her Apple ID account with her current (now compromised) credentials, and fully authenticated our login request with the MFA one-time code.

Once logged in, we verified that all her information in the account was correct and hadn’t been altered and then updated her password with a new unique, strong password from her password manager.

Lastly, we ran a virus and malicious software scan on her computer; this came back clean. We cleared her cookies and website data in all her web browsers and restarted her machine. We ran another virus and malware scan, again, clean, and called it a night.

Has this happened to you?

Here are several things you can do right now to lower your risk of these types of threats:

  1. Refresh your knowledge of phishing attacks by reviewing this resource:
  2. Go to, enter your email address in their search engine, and see if your email has been part of a breach. If it has, change those account passwords immediately.
  3. Invest in – and use – a password manager. Wired has an excellent article on these:
  4. Enable multi-factor authentication/two-factor authentication at a minimum on your financial and social media accounts. Check out this piece from the Electronic Frontier Foundation to learn more:
  5. Routinely scan your computers for viruses and malware.

While these things will not eliminate the threat, employing even a few could lower your risk.

David Miller



Add a comment



11th June 2021

"expand the work horizon for women 45+ through tech focused learning opportunities, resource sharing and community building."


Why women only - why not include males?

Why 45+ age range - why not all ages?

Is this sexist & biased?

It is very technical - I would have thought a more "lay summary" type of article would have had more impact.

To me it is Americanised - it is not International in description - will the "good housekeeping" points be as effective to other parts of the world?

With the help of Mr Google and my "grey matter," I came to the conclusion that most of it is "above my pay grade" & relevance to my world.

But I enjoyed reading it.

  • Like
  • Reply
  • Report


10th June 2021

After reading this article I felt a little sad for Mr Miller.
His wife has 1637 unread emails in her personal inbox.
If she spends just 10 seconds glancing at each email then she would be sitting on the couch for more than 4.5 hours not doing anything else.
What kind of life is that?
No wonder the poor woman may make mistakes.
Perhaps a re-think of online priorities is called for, or Mr miller could be making supper for the rest of his life(?)

  • Like
  • Reply
  • Report