Using these above-board services helps fraudsters bring an air of legitimacy to their scams.

Genuine Fakes

Using legitimate services to trick users into handing over their login credentials isnt new.

Just like other phishing attacks, this one too begins with a fraudulent email.

illustration of hacker and cyber criminals phishing stealing private personal data

Mykyta Dolmatov / Getty Images

Users should take the time to read and inspect the email to determine whether something is suspicious."

Internet Phishing, Account Hacking Attempt by Malicious Email

bagotaj / Getty Images