News

“Why Did I Just Email Myself?” – The Phishing Trick That’s Fooling Everyone

Written by Jonathan Perz, Manager of Information Security at Abacus Technologies

It starts the same way for many people. You open your inbox and see an email – from you. Your name. Your address. Sent to yourself. For a moment, your stomach drops. Was I hacked? Did someone get into my account?

That reaction is exactly what the attacker is counting on.

This Isn’t a Breach – It’s Spoofing

What you’re seeing is part of a growing phishing wave. Attackers are not logging into your account. Instead, they are making an email look like it came from you. No password required. No breach necessary.

Callout:
If you receive an email from yourself, it does not automatically mean your account is compromised.

Watch the “External” Label – It Matters

Most companies mark emails that originate outside the organization with an “External” label. Pay attention to it.

If you receive an email:

  • From yourself, or
  • From a coworker

…and it has an External tag, that is a strong indicator of spoofing.

Callout:
Internal sender + External label = Report it immediately. Do not ignore that banner. It is there for a reason.

The Real Goal: Your Credentials

These emails are not just meant to scare you; they are designed to get you to act.

Most will:

  • Include a link, or
  • Prompt you to open an attachment

That action often leads to a fake login page – one that looks legitimate but is controlled by the attacker. Once you enter your username and password, they have what they need.

Callout:
If an email pushes you to log in, stop. Verify before you act.

You’re Not the Only Target

This isn’t just happening to you.

Attackers are sending these emails:

  • From “you”
  • To you and your coworkers

That’s why reporting matters. What looks like a single email is often part of a broader campaign across your organization.

Callout:
Reporting one email can protect the entire company. Use your company’s phishing report button or security process every time.

Why This Works So Well

Attackers are combining two powerful advantages:

  • AI-generated emails that look clean and believable
  • Massive volume that overwhelms defenses

Many of these emails:

  • Have no obvious errors
  • Avoid traditional red flags
  • Slip past filters by design

Callout:
You have to be right every time. An attacker only has to be right once.

What Companies Should Do

Organizations must reinforce both technology and awareness:

  • Enforce strong email authentication to reduce spoofing
  • Maintain clear External labeling on inbound email
  • Deploy advanced email security and monitoring
  • Train users to recognize modern phishing tactics
  • Make reporting simple and expected

But even with all of that in place, one truth remains:

Security depends on how people handle email.

Final Thought

The inbox is no longer a passive tool – it is an active threat surface. Every message must be treated with scrutiny, especially the ones that look familiar. Slow down. Pay attention. Verify before you act. Because in today’s environment, one moment of trust is all an attacker needs.

Let’s rephrase the no password required, no breach necessary line. Instead, we should focus on the fact that these emails are designed to get someone to give a username and password and can lead to a compromise, but they don’t mean you are compromised.

Abacus is here to help

Need help strengthening your defenses against modern phishing threats? Abacus Technologies can help your organization improve email security, user awareness, and incident response so your team knows what to look for- and what to do next. Contact Abacus Technologies today to start building a safer inbox.

Transform
Technology Solutions