Crazypatterns — Email Security: Identify Phishing & Verify Emails
- Quick summary first
- What we do at Crazypatterns is state of the art
- How to technically verify an email (Gmail example)
- Current information on email fraud (Phishing/BEC)
- Developments that influence phishing trends
- Practical tips (for Crazypatterns emails – and in general)
- Conclusion
- Sources and references
Quick summary first: We keep our email-sending infrastructure technically up to date and explain below how you can verify whether an email from Crazypatterns is genuine. You’ll also find current figures and trends on phishing/spam.
1) What we do at Crazypatterns is state of the art
- Authenticated sender domain: Our emails are protected with SPF (authorized sending servers) and DKIM (cryptographic signatures) and are monitored via DMARC. In many email clients, you’ll find this under
Authentication-Results; legitimate emails usually showspf=pass,dkim=pass, anddmarc=pass. (IETF Datatracker, Google Help) - No data harvesting: We never ask for passwords, payment information, authentication codes, or similar via email.
- Attachments and content: We don’t send
.zip/.exeattachments, and we don’t deliver instructions as email attachments. - Domain clarity: Our links point to https://www.crazypatterns.net, and sender addresses end with
@crazypatterns.net(watch out for look-alike domains). - How to report suspicious emails: Don’t click links or download attachments. If needed, open our website manually in your browser and forward suspicious emails, including full headers, to Support — we’ll review and block abusive senders if necessary.
How to technically verify an email (Gmail example)
- Open the email → ⋮ More → “Show original.” At the top, you’ll see the authentication results; in the headers, you’ll find
Authentication-Results. If it shows “pass,” the message is very likely legitimate; if you see “fail/softfail,” don’t click anything and forward it to Support. (Google Help)
2) Current information on email fraud (Phishing/BEC) — why caution remains important
- Phishing volume: The Anti-Phishing Working Group counted nearly 5 million attacks in 2023 (a record year). In 2024, the numbers dipped at first, then rose again; Q4 2024: 989,123 attacks; Q1 2025: 1,003,924 — the highest level since late 2023. (docs.apwg.org, apwg.org)
- Business Email Compromise (BEC): According to the FBI IC3, reported BEC losses in 2024 totaled $2.77 billion; in total, 859,532 complaints about internet crime were filed, with $16.6 billion in losses (+33% vs. 2023).
- “Human factor”: According to the 2024 Verizon DBIR, human error contributed to 68% of breaches; the median time to “take the bait” from a phishing email was under 60 seconds. (Verizon)
- New tactics: APWG reports that criminals send millions of emails with QR codes (“quishing”) every day, leading to phishing sites/malware. (apwg.org)
3) Developments that influence phishing trends
- Tighter mailbox rules since 2024 (Google/Yahoo):
Since February 2024, major inbox providers have enforced, among other things, SPF/DKIM, DMARC (for bulk senders), TLS, domain alignment, and one-click unsubscribe. The spam rate must also remain below 0.3%. This has significantly increased authentication rates across the ecosystem. (Google Help, senders.yahooinc.com) - Measurable impact on adoption: Data shows a sharp rise in DMARC records at the start of 2024 (accelerating noticeably after the Google/Yahoo announcements and rollout). (Valimail, Dark Reading)
Additionally, BIMI (logo display based on DMARC) is also on the rise; between May 2024 and January 2025, the number of domains with BIMI DNS records increased by 28% among the top one million domains. (URIports) - Attackers’ counter-moves: In parallel, threat actors are leaning more on QR codes (see above) or using social engineering/BEC variants. ENISA lists social engineering (including phishing/BEC) as one of Europe’s key threat areas. (securitydelta.nl)
4) Practical tips (for Crazypatterns emails – and in general)
- Verify the sender: Does the address really end with
@crazypatterns.net? Beware of swapped or visually similar characters. - Check links: Hover to preview the destination URL — legitimate links point to https://www.crazypatterns.net/. When in doubt, type the address manually instead of clicking.
- Look at the headers: In Gmail or other clients, open the original message and check for
spf=pass,dkim=pass, anddmarc=pass. If you see “fail/softfail,” don’t click anything; forward to Support. (Google Help) - Never submit sensitive data via email: Crazypatterns will never ask for passwords, payment information, or other sensitive data via email.
- QR codes and attachments: Treat QR codes in emails/attachments with caution (“quishing”). We do not send
.zip/.exeattachments. (apwg.org) - Use MFA/2FA: Multi-factor authentication (MFA) dramatically lowers the risk of account compromise (Microsoft data: about 99% fewer account takeovers). (Microsoft)
- Stay alert to BEC: If you receive requests to change payment or bank details, always verify them through a second channel (for example, by messaging or calling a known number). Never reply directly to the email thread. FBI data shows BEC causes the highest financial losses.
5) Conclusion
Email remains a heavily targeted channel. We secure our communications with SPF, DKIM, and DMARC and provide clear processes. If you follow the checks above — especially reviewing headers, opening links manually, and never sharing sensitive data via email — you’ll be on the safe side. The data from APWG, FBI IC3, Verizon, and ENISA confirms this: technical hardening combined with user vigilance works — and remains essential.
Sources and references
- APWG, Phishing Activity Trends (Q1 2025; Q4 2024; Q1 2024). (apwg.org, docs.apwg.org)
- FBI, IC3 Internet Crime Report 2024 (complaints, losses; BEC losses).
- Verizon, Data Breach Investigations Report 2024 (Human factor 68%; phishing reaction times). (Verizon)
- ENISA, Threat Landscape 2024 (Social engineering/BEC as key threats). (securitydelta.nl)
- Google, Email sender guidelines (SPF/DKIM/DMARC, TLS, alignment, 0.3% threshold, one-click unsubscribe). (Google Help)
- Yahoo, Sender Best Practices (authentication, one-click unsubscribe, complaint thresholds). (senders.yahooinc.com)
- Google Help, “Show original”/Authentication-Results (viewing headers and checking SPF/DKIM/DMARC in Gmail). (Google Help)
- Valimail/Dark Reading, DMARC adoption 2024 (sharp increase around the Gmail/Yahoo requirements). (Valimail, Dark Reading)
- URIports, BIMI adoption 2024→2025 (+28% among top one million domains). (URIports)
- Microsoft, Digital Defense Report 2023 (MFA reduces compromises by about 99%). (Microsoft)
Note: SPF (RFC 7208), DKIM (RFC 6376), and DMARC (RFC 7489) are IETF standards; if you want to dig deeper, you’ll find the specifications here. (IETF Datatracker)
As of September 10, 2025
Stay vigilant — and report suspected cases to us with full headers.
Thank you!