How to Spot Fake Emails: A Guide Using a Real Example
In the digital age, spam and phishing emails are more dangerous and deceptive than ever before. Cybercriminals craft their messages to appear legitimate, often impersonating government institutions or known contacts. In this article, we'll dissect a suspicious email example from an alleged government address — Bernadina.Botha@dcs.gov.za — and highlight the red flags, keywords, and best practices for identifying fake emails. We'll also discuss how to safely handle such emails and include tips for protecting your inbox.
📩 Example Suspicious Email
Sender: Bernadina.Botha@dcs.gov.za
Subject: "Good day"
Message:
Good day
Please find the attached document for your review and attention. We kindly request you to go through the provided materials at your earliest convenience, as they contain important information relevant to the matter at hand. Should you have any questions, need further clarification, or require additional details, please do not hesitate to reach out. We are here to assist you and ensure you have everything you need.
Thank you for taking the time to review the attachment.
Kind Regards,
Botha, Bernadina
🔍 Red Flags and Warning Signs
While the email might appear polite and professional, several red flags raise suspicion:
1. Unsolicited Attachments
The email mentions an “attached document” without any prior context. Never open attachments from unknown or unexpected sources. These files may contain malware or ransomware.
2. Generic Language
There’s no personalization. Phrases like:
-
“Please find the attached document”
-
“Important information”
-
“Kindly review”
…are vague and frequently used in phishing attempts.
3. Impersonation of Authority
Using a .gov.za domain may give a false sense of trust. But scammers can spoof email addresses or compromise legitimate ones.
4. Suspicious Tone
While the tone is courteous, it's overly formal and scripted — another common sign of phishing emails.
🔑 Keywords That Raise Suspicion
Here are some common keywords and phrases in phishing or scam emails:
| “Important Document” | Used to prompt urgency |
| “Your review is required” | Attempts to rush the reader |
| “Click here” / “Open attachment” | Dangerous links or files |
| “We are here to assist you” | Trying to build false trust |
| “Act now” / “Immediate attention” | Urgent call to action that bypasses critical thought |
✅ How to Verify a Legitimate Email
To separate real emails from scams, follow these steps:
1. Check the Sender Address Carefully
Even if the email looks like a government one (@dcs.gov.za), verify:
-
Is it someone you’ve communicated with before?
-
Does it match known public contact info?
-
Was it expected?
💡 Tip: Scammers can spoof real-looking email addresses, so never rely on that alone.
2. Look for Personalization
A legitimate email will likely include:
-
Your name
-
Context or reference to prior communication
3. Don’t Open Suspicious Attachments
Even PDFs or DOCs can carry embedded malware. Use antivirus software and open files only from known senders.
4. Scan with Tools
You can upload attachments to VirusTotal.com to check if they’re malicious — without opening them.
5. Contact the Claimed Organization Directly
If unsure, go to the official website and call or email using published contact details — not those in the email.
🛡️ Best Practices for Email Safety
🔐 Use Strong Email Filters
Ensure your email provider or business uses:
-
Spam filters
-
Malware scanning
-
Two-factor authentication
⚠️ Be Cautious with Public Wi-Fi
Avoid opening suspicious emails or downloading files on unsecured networks.
🧠 Educate Your Team or Family
Scammers often target businesses or elderly individuals. Training and awareness reduce risks dramatically.
🏷️ Recommended Tags and SEO Keywords
Here are some useful SEO tags and keywords for this article:
Tags:
-
email safety
-
phishing scams
-
digital security
-
online safety tips
spam email alert
-
cybercrime awareness
-
how to identify fake emails
-
phishing email examples
-
email scam warning signs
-
email security tips
-
government email scam
-
suspicious email analysis
-
A mock-up of a fake email with red flags highlighted
-
An infographic with steps to detect phishing
-
A laptop screen showing a "warning" popup from antivirus software
SEO Keywords:
🖼️ Related Image Suggestion
Would you like a visual aid for your article? I can provide an image such as:
Please let me know what you'd prefer — I can generate or find one for you right away.
📬 Conclusion
As phishing emails become more sophisticated, so must our awareness. Even emails that appear to come from reputable government sources like Bernadina.Botha@dcs.gov.za can be faked or compromised. Always be cautious, verify the sender, and avoid downloading unexpected attachments.
If you're ever unsure, it’s better to delete first and verify later than to fall victim to a scam.










