{"componentChunkName":"component---src-pages-markdown-remark-fields-slug-js","path":"/identity/stop-scammers-getting-email-address/","result":{"data":{"markdownRemark":{"id":"b4c30d44-23d2-5f4c-a8e9-ad5fb006a451","excerpt":"Introduction Have you ever wondered how email scammers get your private email address? Scammers are always looking for ways to collect data—from phishing emails…","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Have you ever wondered how email scammers get your private email address? Scammers are always looking for ways to collect data—from phishing emails to fake login pages. We want you to be on your guard and learn what they’ll do to try and get your personal information.</p>\n<p>For example, you know the kind of scam messages that try to trick you into clicking on a link to see photos of cute kittens? Scammers use your social media accounts to learn your name and other identifying information, which they use to send emails that look like they’re from a friend.</p>\n<p>In this article, we’ll tell you exactly how they do it and what you can do to stop them.</p>\n<h2 id=\"what-are-phishing-email-scams\" style=\"position:relative;\"><a href=\"#what-are-phishing-email-scams\" aria-label=\"what are phishing email scams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are Phishing Email Scams</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">Phishing emails</a> are not just innocent spam. They are criminal attempts to fraudulently acquire private information from unsuspecting users. Some people, however, allow their greed to get the best of them and fall for these scams. Even though some of these emails are quite easy to see through, millions of people every year still fall prey to phishing scams.</p>\n<p>It's no secret that cybercriminals attack their targets by sending out sophisticated phishing email scams. These scams resemble emails from legitimate banks, government agencies, credit card companies, social networking sites, online payment websites, or multiple online stores. These usually begin with an approach where the sender asks recipients to click on a link that redirects them to an ad page where they need to specify and confirm personal data, account information, etc.</p>\n<p>These phishing email spams usually include:</p>\n<ul>\n<li>Advertisement spams such as online shopping, pharmacy purchases, gambling</li>\n<li>Work-from-home job offers and schemes</li>\n<li>Hoax charity appeals and virus threats</li>\n</ul>\n<p>Once hackers have obtained the necessary information, they create new user credentials or install malware into your system to steal sensitive information.</p>\n<h2 id=\"how-do-spammers-obtain-your-email-address\" style=\"position:relative;\"><a href=\"#how-do-spammers-obtain-your-email-address\" aria-label=\"how do spammers obtain your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Spammers Obtain Your Email Address</h2>\n<p>Spammers—people who send spam e-mail messages—use many different methods to collect e-mail addresses. We have list below some of the most common ones: </p>\n<h3 id=\"1-by-using-harvesting-programs\" style=\"position:relative;\"><a href=\"#1-by-using-harvesting-programs\" aria-label=\"1 by using harvesting programs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. By using harvesting programs</h3>\n<p>Spammers and cybercriminals engage in phishing email scams by using harvesting software to steal and gather email addresses from the internet. Professional spammers <a href=\"https://www.loginradius.com/blog/identity/bot-attacks/\">rely on bots</a> that crawl millions of websites and scrape addresses from pages. Other spammers get email addresses by approaching sellers on underground cybercrime forums, or in open-air markets where addresses are found in mailing lists, websites, chat rooms, and domain contact points.</p>\n<h3 id=\"2-by-using-random-alphanumeric-combinations\" style=\"position:relative;\"><a href=\"#2-by-using-random-alphanumeric-combinations\" aria-label=\"2 by using random alphanumeric combinations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. By using random alphanumeric combinations</h3>\n<p>Scammers use <a href=\"https://www.loginradius.com/blog/identity/brute-force-lockout/\">brute force attacks</a> to generate various alphanumeric combinations of email addresses in a sequential manner by automatically entering random letters, numbers, and symbols until they get any one of those right. </p>\n<h3 id=\"3-by-using-cc-email\" style=\"position:relative;\"><a href=\"#3-by-using-cc-email\" aria-label=\"3 by using cc email permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. By using CC email</h3>\n<p>Phishing email scams can often result when anyone uses carbon copy (CC) while addressing an email to a group of people. This results in forwarding the same email repetitively, thereby exposing the email addresses of all the people concerned.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-loginradius-prevents-bot-attacks/\"><img src=\"/542f2f42d33abd2da62dbf8033af5588/WP-bot-attacks.webp\" alt=\"WP-bot-attacks\"></a></p>\n<h2 id=\"how-to-prevent-phishing-email-scams\" style=\"position:relative;\"><a href=\"#how-to-prevent-phishing-email-scams\" aria-label=\"how to prevent phishing email scams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Phishing Email Scams</h2>\n<p>With scammers attempting to get you to give out personal information to an untrustworthy source, here's how to fight back.</p>\n<h3 id=\"1-avoid-public-posts\" style=\"position:relative;\"><a href=\"#1-avoid-public-posts\" aria-label=\"1 avoid public posts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Avoid public posts</h3>\n<p>Everyone has easy access to the internet via mobile phones, laptops, and computers. This puts your public posts at constant risk of being hacked by professional spammers and cybercriminals. To prevent spammers from knowing your personal and financial information, you should avoid posting your email addresses and other sensitive content in public.</p>\n<h3 id=\"2-learn-to-spot-the-spams\" style=\"position:relative;\"><a href=\"#2-learn-to-spot-the-spams\" aria-label=\"2 learn to spot the spams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Learn to spot the spams</h3>\n<p>Even if your email has fallen into the wrong hands, you can still prevent your personal content and financial information from getting leaked by identifying spam and not responding to them.</p>\n<p>Some warnings or indications are:</p>\n<ul>\n<li>The email received lacks legitimate content.</li>\n<li>The sender is unknown or anonymous.</li>\n<li>The received email may contain misspelled words and sentences purposely designed to fool spam filters such as IndiAgo for Indigo, Adidos for Adidas, etc.</li>\n<li>The received email may contain offers that seem too good to be true.</li>\n<li>The received email may contain urgent end dates like offering discounts for shopping within the due schedule.</li>\n<li>The received email may contain requests such as to forward certain messages to a large number of people in the name of offering money for doing so.</li>\n<li>The received email may contain links that redirect you to other ad pages containing malware.</li>\n</ul>\n<h3 id=\"3-use-two-factor-authentication-2fa\" style=\"position:relative;\"><a href=\"#3-use-two-factor-authentication-2fa\" aria-label=\"3 use two factor authentication 2fa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Use two-factor authentication (2FA)</h3>\n<p><a href=\"https://www.loginradius.com/developers/\">Two-factor authentication (2FA)</a> is an extra layer of security on top of your password login. It's commonly used in online applications, especially to protect accounts that can be accessed from anywhere and have high-value personal data. </p>\n<h3 id=\"4-integrate-graphics-to-your-emails\" style=\"position:relative;\"><a href=\"#4-integrate-graphics-to-your-emails\" aria-label=\"4 integrate graphics to your emails permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Integrate graphics to your emails</h3>\n<p>Email addresses can be implemented as graphic features, making it complicated to harvest programs and dictionary features to recognize them. This can ensure security and privacy as such texts cannot be copied or linked with malware. </p>\n<h3 id=\"5-obfuscate\" style=\"position:relative;\"><a href=\"#5-obfuscate\" aria-label=\"5 obfuscate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Obfuscate</h3>\n<p>You can obfuscate, or scramble, your email address by using HTML and JavaScript in emails. Obfuscation also makes it harder for hackers to see the real email address you are using.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As email addresses have become ubiquitous and the messaging process more interactive, scammers have evolved to follow suit. The best way to protect yourself is to be mindful of how you use your address and how you share it with others. </p>\n<p>By taking simple precautions, including checking the source of the message and even flagging suspicious emails as spam, you can keep the scammers away, and remain in control of your inbox.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=stop-scammers-getting-email-address\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","headings":[{"value":"Introduction","depth":2},{"value":"What Are Phishing Email Scams","depth":2},{"value":"How Do Spammers Obtain Your Email Address","depth":2},{"value":"1. By using harvesting programs","depth":3},{"value":"2. By using random alphanumeric combinations","depth":3},{"value":"3. By using CC email","depth":3},{"value":"How to Prevent Phishing Email Scams","depth":2},{"value":"1. Avoid public posts","depth":3},{"value":"2. Learn to spot the spams","depth":3},{"value":"3. Use two-factor authentication (2FA)","depth":3},{"value":"4. Integrate graphics to your emails","depth":3},{"value":"5. Obfuscate","depth":3},{"value":"Conclusion","depth":2}],"fields":{"slug":"/identity/stop-scammers-getting-email-address/"},"frontmatter":{"metatitle":"How To Stop Scammers From Getting Your Email Address","metadescription":"It is alarming how many people are getting their email address stolen. This blog covers different methods on how to prevent scammers from stealing email addresses.","description":"When you type your email address into a website, be careful. You might have just given your email address to a scammer. Sadly, this happens all too often and is one of the main ways scammers harvest email addresses. This blog offers solutions on how to stop it from happening.","title":"This Is How Scammers Get Your Email Address & How to Stop Them","canonical":null,"date":"January 19, 2022","updated_date":null,"tags":["data security","2fa","mfa","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.0833333333333335,"src":"/static/785e97d501a8bb97e5fe32bfbdfe5534/faef7/scammers.webp","srcSet":"/static/785e97d501a8bb97e5fe32bfbdfe5534/1c9b5/scammers.webp 200w,\n/static/785e97d501a8bb97e5fe32bfbdfe5534/f1752/scammers.webp 400w,\n/static/785e97d501a8bb97e5fe32bfbdfe5534/faef7/scammers.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"bio":"A content creator both by choice and profession with 7+ years of experience. A copy editor, SaaS-enthusiast, quick learner, adaptable, and a good researcher. When not at work, you will probably find her curled up in literature with happy endings!","avatar":null}}}},"pageContext":{"id":"b4c30d44-23d2-5f4c-a8e9-ad5fb006a451","fields__slug":"/identity/stop-scammers-getting-email-address/","__params":{"fields__slug":"identity"}}},"staticQueryHashes":["1171199041","1384082988","1711371485","1753898100","2100481360","229320306","23180105","528864852"]}