Online Banking & Account Security · Security Guide

Bank Phishing Emails: How to Spot a Fake and What to Do

Fake bank emails are the most common form of phishing. Learn the 8 signs and what to do if you clicked a link.

ATM Fortify Security Team Payment fraud & ATM security specialists — Updated February 2026

Last Updated: February 2026


Key Takeaways:

  • Bank phishing emails look increasingly authentic — logos, formatting, and tone can mirror the genuine article
  • The URL is the most reliable indicator: always check where a link actually goes before clicking
  • Never enter your banking credentials after following a link from an email — navigate directly to your bank's site
  • If you clicked a phishing link, change your banking password immediately from a clean device
  • Report phishing emails to your bank and the national reporting service

What Is Bank Phishing?

Phishing is the use of fraudulent communications — most commonly emails — to trick you into revealing credentials, clicking malicious links, or downloading malware. Bank phishing specifically impersonates your bank, card provider, or payment service.

It is the single most common initial step in online banking fraud. Before an account can be taken over, credentials usually need to be captured — and phishing is the most scalable way to do that.

A successful phishing campaign might target hundreds of thousands of email addresses, knowing that a small percentage will belong to customers of the impersonated bank, and a small percentage of those will click and enter their details. The economics work for the criminal even with very low success rates.


8 Signs of a Fraudulent Bank Email

1. The Sender Address Doesn't Match Your Bank's Domain

The display name can say anything — "Barclays Security Team" or "Chase Alert." Look at the actual email address in the header. If it ends in anything other than your bank's exact, verified domain (e.g., @barclays.co.uk, @chase.com), be suspicious.

Look specifically for:

  • Near-miss domains: @barclays-secure.co.uk, @chasebank.com, @lloyds-notify.com
  • Generic providers: Gmail, Yahoo, Outlook addresses are never used by genuine bank correspondence
  • Garbled or random characters before the @

2. It Creates Urgency

"Your account has been suspended." "You have 24 hours to verify." "Immediate action required."

Urgency is a deliberate manipulation technique. It pushes you to act before thinking. Genuine banks do have time-sensitive communications — but legitimate bank emails rarely threaten immediate account closure for failing to click a link.

Hover your cursor over any link in the email (without clicking) and look at where the URL actually points — shown in the bottom bar of your browser or mail client.

Compare: the link text may say www.yourbank.com/verify but the actual URL might be www.yourbank-secure-verify.net/login.

If the destination URL does not start with your bank's exact, official domain — do not click.

4. It Asks You to Confirm Sensitive Information

Genuine bank emails do not ask you to enter your full password, full card number, PIN, or OTP by following a link. If an email asks for any of these — through any mechanism — it is fraudulent.

5. Generic Greetings

"Dear Customer," "Dear Account Holder," or simply "Hello" are often signs of mass phishing campaigns that do not know your name. Spear-phishing uses your real name — this test is less reliable as attacks become more targeted.

6. Grammar and Formatting Inconsistencies

Phishing emails from less sophisticated operations contain grammatical errors, unusual capitalisation, odd spacing, or formatting inconsistencies. More sophisticated operations produce near-perfect emails — the absence of errors does not confirm legitimacy.

7. Unexpected Account Alerts You Didn't Trigger

An alert about a transaction you did not make, a login from a location you have not visited, or a password change you did not initiate — these could be genuine fraud alerts, or they could be phishing hooks designed to make you panic and click.

The safe response: Do not click any link in the email. Navigate directly to your banking app or website, or call the number on your card, to verify whether anything actually happened.

8. Attachments You Were Not Expecting

Genuine bank correspondence rarely requires you to open an attachment. Unexpected attachments — particularly .pdf, .docx, .zip, or .exe files — from a "bank" are a high-risk phishing vector. Do not open them.


Scenario A: Fake Login Page

You are directed to a page that looks identical to your bank's login screen. You enter your username and password. The credentials are captured by the criminal. You may then be redirected to the genuine bank site — the process feels seamless and you may not realise anything happened.

The criminal now has your username and password. If they also need your OTP, you may receive a call [vishing] or a fake OTP confirmation screen — also on the phishing page — where you are asked to enter the code.

Scenario B: Drive-By Malware

Some phishing links do not show a login page — they automatically attempt to install malware on your device through browser or plugin vulnerabilities. You may see nothing unusual. The malware may then capture future login sessions, keystrokes, or OTPs.

This is why it is important to keep your browser and operating system updated — patches close the vulnerabilities these attacks exploit.


If you clicked but did not enter any information:

  • Scan your device with reputable security software
  • Change your banking password as a precaution
  • Monitor your account for unusual activity

If you clicked and entered credentials:

  1. Change your banking password immediately — from a different, clean device if possible
  2. Enable or change your 2FA method
  3. Call your bank's fraud line and report the incident
  4. Check your account for any unauthorised activity
  5. Change the same password on any other account where you reused it
  6. Report the phishing email to your bank (most have a dedicated address, e.g., [email protected]) and to your national reporting service

Payment Fraud Incident Response: A Step-by-Step Guide


How to Report a Phishing Email

  • Forward to your bank: Most banks have a dedicated phishing reporting email. Check their website.
  • UK: Forward to [email protected] (the NCSC's reporting service)
  • US: Forward to [email protected] or the FTC at [email protected]
  • Delete it after reporting — do not click anything in the email to report it from within the email

Frequently Asked Questions

Q: I received a very convincing bank email with my real name. Is it definitely phishing? A: Spear-phishing uses your real name and other personal details gathered from data breaches or social media. A personalised email is more credible — but it can still be fraudulent. The sender address and link destination are still your most reliable checks.

Q: My bank did send me a link to verify something. How do I know it's real? A: The safest practice is always to navigate to your bank's website directly — not through the link in the email — and look for any verification request within your secure account. If your account shows no such request, the email was fraudulent.

Q: How do phishing emails get past spam filters? A: Phishing operations deliberately craft emails to avoid keyword-based filters, use legitimate email sending infrastructure, and gradually build sending reputation. Filters improve constantly, but so do phishing techniques. No filter is perfect.

Q: My work email received a bank phishing email. Could my company be at risk? A: If the phishing email was sent to your work address, it may be a sign of a targeted campaign against your organisation. Report it to your IT security team in addition to the steps above.



Last Updated: February 2026 | If you have entered banking credentials into a phishing page, change your password and call your bank immediately. Educational purposes only.

Need Professional ATM Security Support?

ATM Fortify provides anti-skimming hardware, security assessments, and fraud prevention consulting for ATM operators and financial institutions across 30+ countries.

Request a Security Assessment Explore Services