Pulse Inbox Shield BrandGuard Compliance Workspace Posture Free DMARC Checker Free SSL Checker
Email Security Phishing Threat Intelligence

Phishing Email Examples 2026: What to Look For

By EdgeIQ Labs May 20, 2026 7 min read

Phishing emails don't look like they used to. The typos are gone. The logos are perfect. The sender domain passes SPF. And increasingly, the email comes from a real account that was already compromised — not a fake one.

This guide breaks down the most common phishing patterns active in 2026, shows you real-world examples, and explains the signals that still give attackers away — even when everything else looks legitimate.

36%
of breaches start with phishing (Verizon DBIR 2025)
3.4B
phishing emails sent per day globally
82%
of orgs experienced phishing in 2025

Why Phishing Still Works in 2026

Security training hasn't kept pace with attacker tooling. AI-generated phishing emails are now grammatically perfect, contextually aware, and personalized at scale. A model trained on your company's public LinkedIn profiles, press releases, and job postings can produce a highly convincing spear-phish in seconds.

Meanwhile, attackers have shifted from sending email from fake domains to sending email through real services: legitimate Dropbox share links, real DocuSign envelopes, actual Microsoft Form submissions. These pass every technical filter — because they are technically authentic.

Example 1: The Microsoft "Unusual Sign-In" Lure

This is the most-clicked phishing template in 2026. It impersonates a Microsoft account security alert and drives victims to a credential-harvesting page that mirrors the Microsoft login flow.

From: [email protected] Subject: Unusual sign-in activity detected
We detected a sign-in to your Microsoft account from an unfamiliar device. Location: Kyiv, Ukraine Device: Windows 11 / Chrome Time: Today at 03:42 AM If this was you, no action is needed. If this wasn't you, secure your account immediately: [Review Activity] ← button links to: microsoft-account-verify.com/secure If you don't respond within 24 hours, your account may be suspended.
Red flags: Sender domain is microsoft-account-verify.com — not microsoft.com. Urgency + fear tactic ("account may be suspended"). The link domain doesn't match the sender domain. Legitimate Microsoft emails always come from @microsoft.com or @accountprotection.microsoft.com.

The credential page at the destination often uses adversary-in-the-middle (AiTM) toolkits like Evilginx or Modlishka — meaning it proxies the real Microsoft login page in real time and steals session tokens, bypassing MFA entirely.

Example 2: The DocuSign Envelope

This variant is dangerous because it often uses real DocuSign infrastructure. The attacker creates a free DocuSign account and sends a legitimate envelope. The email passes SPF, DKIM, and DMARC for docusign.com. The document inside requests a signature — and then redirects to a phishing page.

From: [email protected] Subject: Please DocuSign: Q2 Vendor Agreement — Action Required
David Chen sent you a document to review and sign. Document: Q2-Vendor-Agreement-Final.pdf Sender: David Chen ([email protected]) Message: "Hi — please review and sign by EOD Friday." [Review Document] This email was sent using DocuSign. It's automatically authenticated. © DocuSign Inc. | Privacy | Terms
Red flags: The sender name and email don't match anyone you know. The document name is generic. There was no prior communication about a vendor agreement. When you click "Review Document," the DocuSign envelope contains a single page with a link to an external site — not a real document to sign. Urgency: "by EOD Friday."
How to verify: Log in to DocuSign directly (not via the email link) and check your inbox there. Legitimate envelopes will appear. If you don't see it, the email was fraudulent.

Example 3: CEO / Executive Fraud (BEC)

Business email compromise (BEC) phishing impersonates a senior executive, typically targeting finance or HR. In 2026, attackers often compromise the executive's real email account first — making detection even harder.

From: [email protected] (compromised real account) Subject: Urgent — wire transfer needed today
Hi Sarah, I'm in a board meeting and can't talk. I need you to process an urgent wire for a vendor payment we need to close today. Amount: $47,500 Beneficiary: Meridian Solutions LLC Bank: Chase Account: 8834-XXXX Routing: 021000021 Please confirm once done. I'll explain everything after the meeting. Thanks, James James Willard CEO, Acme Corp
Red flags: Requests a wire transfer by email with no prior process. Claims to be unavailable to verify ("in a board meeting"). New payee with no payment history. Urgency. Even if the email address looks real — call the CEO at their known number before acting.

Example 4: Payroll Redirect Phishing

This targets HR departments and payroll systems. The attacker impersonates an employee and requests a direct deposit update shortly before payday.

From: [email protected] Subject: Update my direct deposit info
Hi, I recently opened a new bank account and would like to update my direct deposit information before the next pay cycle. New bank: Wells Fargo Routing: 121042882 Account: 9981XXXX Please let me know what I need to do to update this. Thanks, Mike Johnson Software Engineer
Red flags: Email is from a personal Gmail, not the company domain. No prior interaction about a bank change. Timing is close to payday. Legitimate payroll changes require employee portal verification — not email.

Once the redirect is processed, the attacker collects the next payroll deposit. Victims often don't notice until weeks later when they don't receive their paycheck.

Example 5: The Shared File Lure

In 2026, this attack uses real Google Drive or SharePoint links. The attacker shares a document with you through Google's real sharing infrastructure — so the email comes from [email protected] and passes all authentication checks.

From: [email protected] Subject: [email protected] shared a document with you
[email protected] has shared the following document: 📄 Q1-Security-Audit-Results-Confidential.pdf [Open in Google Docs] You can view this document at: https://docs.google.com/document/d/1BxYzABC...
Red flags: The document name implies urgency or curiosity (security audit results). The file, when opened, contains only an image of a document with a "Click to view full report" button — which redirects to a credential phishing page. Or it contains a macro-enabled Office file embedded as a Google Doc export.

The New Red Flags to Train Your Team On

Classic red flags (typos, generic greetings, mismatched logos) are largely obsolete. Here's what to watch for now:

SignalWhat it meansWhat to do
Urgency + financial/credential actionClassic social engineering pressureSlow down. Verify out-of-band.
Request initiated via email (not normal process)Bypassing established controlsFollow your process — not the email.
Link domain ≠ sender domainRedirecting to attacker infrastructureHover before clicking. Check the URL.
New payee / first contactNo relationship to verify againstCall to verify using a known number.
Legitimate service (DocuSign, Drive, Dropbox)Abusing trusted infrastructureLog in directly — don't trust the email.
Sender email ≠ display nameDisplay name spoofingCheck the full From header, not just the name.
Content from a "compromised" accountATO-enabled phishingVerify high-stakes requests by phone.

What Technical Controls Actually Stop Phishing

User training alone is not enough. Attackers send thousands of emails; you only need to miss one. Layered technical controls stop phishing attempts before they reach inboxes:

DMARC, SPF, and DKIM on your own domain

These don't stop attackers from impersonating you — but they stop your domain from being used to send phishing to others. A p=reject DMARC policy blocks unauthenticated email from your domain being delivered anywhere. Without it, attackers can send email "from" [email protected] that passes through many mail servers.

Email filtering with sandbox detonation

Microsoft Defender for Office 365 and Google Workspace's Advanced Protection detonate suspicious links and attachments in a sandbox before delivery. This catches AiTM phishing kits and macro-embedded files.

Phishing-resistant MFA

TOTP/SMS MFA can be bypassed by AiTM proxies. FIDO2 hardware keys (YubiKey, Passkeys) cannot — they cryptographically bind to the legitimate domain. If you're at high risk, make the switch.

Domain monitoring for lookalike domains

Attackers register acme-corp.com or acmecorpo.com before they send phishing campaigns. Monitoring new domain registrations and certificate transparency logs for variations of your brand name gives you early warning.

Phishing Red Flags Checklist

Check Your Domain's Defenses Right Now

If your domain doesn't have a p=reject DMARC policy, attackers can use your domain name to send phishing emails. Use the free checker to see your current email authentication posture in seconds.

Is your domain protected against phishing?

Inbox Shield monitors your DMARC, SPF, and DKIM records 24/7 and alerts you when anything changes — before attackers exploit the gap.

Protect Your Domain →
✓ Check your inbox — checklist on its way.

Frequently Asked Questions

How can I tell if a phishing email is from a real compromised account?
It's very difficult by email alone. The key is process: any high-stakes request (wire transfer, credential reset, payroll change) should require out-of-band verification — a phone call to a known number, or an in-person confirmation. Never trust the contact details in the suspicious email itself.
Do phishing emails always contain links?
No. Some BEC phishing emails contain no links at all — they're pure social engineering to get a response. Others direct you to reply with credentials or wire instructions. The absence of a link doesn't make an email safe.
What does DMARC have to do with phishing?
DMARC protects your domain from being spoofed outbound — if you have p=reject, email claiming to be from your domain that doesn't pass SPF or DKIM will be rejected by recipient mail servers. It doesn't protect you from receiving phishing, but it stops attackers from using your brand to target others.
Can AI-generated phishing be detected?
Generally not by content filters alone — AI-generated text is indistinguishable from human-written text at the email level. Detection has to rely on behavioral signals (unusual sender, new domain, process deviations) rather than grammar or spelling.
What's the difference between phishing and spear phishing?
Phishing is mass-targeted — same email sent to thousands. Spear phishing is personalized to the specific victim: uses their name, role, company, and context to appear more legitimate. CEO fraud and payroll redirect attacks are forms of spear phishing.