15 documented phishing attacks show how fraudsters exploit email-dependent verification to steal client funds. Learn the red flags that protect your business from the next attack.
Tyler Adams
8 minutes
Scams
Jul 19, 2021
Oct 3, 2025
Phishing remains the #1 entry point for real estate wire fraud. According to CertifID's 2025 State of Wire Fraud report, nearly $500 million in annual losses stem from business email compromise attacks targeting the real estate industry.
This article examines 15 real phishing examples, reveals the red flags you must recognize, and demonstrates how removing email from money movement becomes the only reliable defense against increasingly clever attackers.
Phishing emails are fraudulent messages designed to impersonate trusted parties and manipulate recipients into revealing sensitive information or authorizing financial transactions.Â
In real estate, attackers commonly pose as lenders, underwriters, sellers, or even your own clients to redirect funds or capture wire instructions.
Consider a typical mortgage payoff fraud: You receive what appears to be a legitimate email from Mr. Cooper, complete with proper branding and formatting, requesting updated payoff information for a closing scheduled tomorrow.
The sender's address looks authentic, the urgency feels reasonable, and the request seems routineâuntil you discover that $275,000 has been wired to a fraudulent account.
These attacks work because they prey on the trust and time pressure built into real estate transactions.
If this feels uncomfortably plausible, youâre right. In the video below, CertifIDâs Tom Cronkright and Kimberly Casanova show how fraudsters use âroutineâ callbacks in real payoff fraud and what to do instead.
Phishing attacks succeed through social engineeringâthe psychological manipulation of human trust and decision-making under pressure. Fraudsters understand that title professionals work in high-stress environments where quick responses often keep a closing on track.
The mechanics involve techniques like:Â
Modern attackers use AI to study email patterns and generate messages that look and read like the real thing.
The problem with manual verification becomes clear during peak closing periods. When your team processes hundreds of files monthly, the callback-and-verify approach breaks down.
Checking emails on mobile devices after hours, pressure to respond quickly to "urgent" requests, and sheer volume make it easier for sophisticated fakes to slip through.
Types of phishing emails include:
Real estate has a perfect storm for fraud: large transaction amounts, multiple parties communicating across fragmented systems, and historically low cybersecurity infrastructure.
With the U.S. median home sale price in Q2 2025 reaching $410,800, each successful attack yields hundreds of thousands of dollars.
The industry's vulnerability stems from its decentralized nature. Unlike banking, which invested heavily in cybersecurity following decades of attacks, real estate relies on thousands of independent title companies and law firms with varying security sophistication. State-by-state regulation creates inconsistent standards.
Title companies and closing attorneys still rely on email for critical tasks like verifying mortgage payoffs, confirming seller identities, and sending buyer wire instructions.
Attorneys and clients keep using email because it feels familiar, but that dependence gives fraudsters more chances to slip in and divert funds.
CertifID's analysis shows that once a company experiences a single high-risk transaction flag, the rate of suspicious activity increases up to 6x compared to peer firms. This suggests organized criminal groups systematically target specific businesses, hoping to exploit process gaps during busy closings.
Every inbox functions as an unregulated payment rail, capable of authorizing hundreds of thousands of dollars in wire transfers without meaningful verification. Unlike banking systems with multi-factor authentication and fraud monitoring, email offers no safeguards to verify senders or wire instructions.
A single successful attack can wipe out your annual technology budget and threaten your business's survival. Traditional insurance policies often exclude wire fraud losses, leaving you personally liable for client funds.
The regulatory landscape adds another risk layer. As wire fraud incidents increase, state bar associations and insurance carriers scrutinize firms' cybersecurity practices more closely, potentially imposing higher premiums, coverage exclusions, or regulatory sanctions.
Document-sharing platforms like Dropbox, Google Docs, and DocuSign are common targets in real estate transactions. These phishing emails are sent from generic-sounding names or compromised accounts of people you know. If a contactâs account was hacked, their email list can be used to spread the scam.
Clicking the link takes you to a fake login page that captures credentials while appearing nearly identical to the real Dropbox interface.
Red flags:
Like the Dropbox scam, this one starts with an email supposedly from someone you know.
Unlike the Dropbox scam, however, clicking on the link takes you to a real Google Docs page, and asks the user to grant permission to a third-party application entitled âGoogle Docs,â despite the fact it is not associated with the platformÂ
Google has since added stricter rules for third-party apps, including restrictions on what names they can use.
If you grant access, fraudsters can use your login credentials to obtain your personal information, including your contacts list, to spread the attack.
Red flags:
The DocuSign phishing email mimics the companyâs document completion notifications. They often claim "Your document has been completed" and use authentic branding, logos, and the familar blue color scheme.
The email comes from a suspicious sender address, and clicking the "VIEW COMPLETED DOCUMENTS" button redirects you to a malicious domain instead of DocuSign's official servers.
The attack works because people trust DocuSign notifications, particularly in real estate transactions where document signing is routine.Â
Legitimate DocuSign emails always include a 32-character security code in the "Alternate Signing Method" section. Phishing emails leave this out.
Red flags:
A Bank of America phishing email uses authentic branding to claim an account has been suspended due to "unusual activity detected."Â
The email creates urgency by threatening account limitations unless the recipient downloads an HTML attachment for "verification." The message looks professional with clean formatting, footer disclaimers, and contact details that appear legitimate.
However, legitimate banks never ask customers to download attachments to verify their accounts. The email uses a generic greeting like "Valued Customer" and try to pressure the reader with threats debit or credit card limitations.Â
The emailâs polished appearance makes it harder to detect, especially for title professionals juggling multiple business banking relationships.
Red flags:
Wells Fargo phishing emails mimic the bankâs red and yellow branding and warn that an account has been locked pending verification. The email claims purchases and balance transfers will be declined, creating urgency around frozen access. Â
It directs recipients to what looks like the correct URL to unlock their account. The emailâs professional formatting makes the request appear credible.
However, the sender domain differs from Wells Fargoâs official wellsfargo.com; in this case itâs noreply@weiis-mail.com. Phishing domains commonly add hyphens, swap letters, or insert extra words to mimic a real address.Â
These tactics can bypass email security filters and exploit recipientsâ unfamiliarity with text-based phishing. Wells Online is also not a legitimate name used by Wells Fargo.Â
Red flags:
This PayPal phishing example uses the companyâs blue branding to announce that an unexpected $479.35 charge will be deducted from the recipient's account.
The email creates panic by claiming unauthorized charges while providing a toll-free support number for "cancellation." It includes convincing details like invoice numbers and dates.
However, the message uses generic salutation "Dear Customer" and asks you to call a phone number rather than directing users to PayPal's official website, which legitimate PayPal notifications always do.
Red flags:
The same tactics used in document and bank phishing can also target your email credentials, which can give scammers access to the personâs contactsâand, potentially, their banking, shopping, or social media accounts.
Various forms of âvalidate your accountâ Gmail messages have made their rounds, telling users to verify their information to avoid account suspension.Â
They are taken to a real-looking log-in screen, and scammers use their information to access, among other things, the userâs contact list and spread malware or more validation emails.Â
Users should take note of the URLâwhich is not actually a Google oneâand the fact that, once theyâve entered their email address, their profile picture does not appear before theyâre asked for their password.
Email provider phishing scams are especially troubling for real estate agents. Many agents still use personal Google email accounts to communicate with clients, even though experts and brokerages advise against it.
A scammer can simply find their email on a real estate site, Facebook, or LinkedIn, and tailor an attack based on that information. From there, they can steal client details and possibly trick them into sending money or banking credentials, all while pretending to be the agent.
A recent Zillow-based scam was sent to real estate agents, complete with authentic-looking logos, and congratulated the user on their new leads from ZillowAds, which had to be âunlockedâ with their contact details and a fee of $5.00.Â
At least one agent was tricked into providing their credit card information, and missed the only potentially obvious red flag: the fact the domain name was âZillow.proâ instead of a .com address.
Virus and malware attacks appear to come from an internal administrator sending an "Important - Internal ONLY" message with a ZIP file attachment (e.g., internal_04531572.zip).
The email is professionally formatted with confidentiality notices, legal copyright information, and detailed file validity data to appear legitimate. The extensive boilerplate text about intellectual property rights and legal consequences creates an illusion of authenticity.
However, the ZIP attachment contains malware that encrypts across your computer once downloaded. The sender's domain, "tomokuhus.se," doesn't match typical internal company addresses, and legitimate internal communications rarely require downloading compressed files for routine business.
This Facebook phishing email mimics the platformâs branding, uses a personalized greeting "Hi Paulo.", This may come from a look-alike address such as "security@facebookmail.com" and include a reset code (66631625) and "Change password" button to complete the illusion.
Red flags:
Attackers send users an email with the Xfinity logo and layout. This message claims to be a confirmation to verify youâve authorized a payment on a credit card.Â
Since itâs a fake number, it confuses the target and entices them to click on the âComcast Billing Invoiceâ link in the hopes of understanding or fixing the error.
This link leads to a fake domain that prompts the user to download a .php file they believe to be the invoice. Instead, it contains a virus that infects your computer. This malware can compromise secure information stored therein.
Red flags:
Amazon phishing emails like this use Amazon's branding and warn, "We have locked your Amazon account and all pending orders," citing billing information mismatches. The email creates urgency by threatening order cancellation within 3 days unless the recipient clicks "Check Now" to verify billing details.
Red flags:
This inheritance scam email uses formal letterhead formatting to announce a ÂŁ32 million inheritance opportunity from a deceased Libyan national.Â
The scammer poses as "Mr. Jerry Smith," a bank auditor who discovered an abandoned account, offering 35% of funds in exchange for serving as "next of kin." The message creates urgency by claiming funds will be forfeited to the government treasury unless claimed immediately.
Red flags:
Sophisticated settlement scams use professional property agent branding to request large sums of money. In this Australian example, the scammer demands an urgent $80,500 deposit transfer to a "Trust Account."Â
The email appears to come from a legitimate conveyancer with authentic formatting and specific BSB/account details. It creates artificial urgency with a deadline of "by 5 April at 5:00pm," and warns that "failure to provide will result in forfeiture of contract."
Red flags:
Deepfake impersonation scams use AI-generated video to pose as property sellers during verification calls, supported by fake documents such as driver's licenses, utility bills, and property records.Â
The fraudsters create real-time video interactions that respond to verification questions while presenting authentic-looking supporting documentation. The technology exploits traditional verification methods by making visual and audio confirmation unreliable.
Red flags:
AI-powered fraud eliminates the traditional warning signs, like poor grammar and obvious formatting errors. With these cues gone, the stakes are higher for industries like real estate, where clients now demand stronger protection.Â
Our data shows 79% of consumers are willing to pay more for secure real estate services. This proves that preventing wire fraud is now both a necessity and a competitive advantage.
The next step is clear: Remove email from money movement entirely. In an industry where mistakes cost hundreds of thousands, you can't afford anything less than full protection.
Co-founder & CEO
Tyler brings a decade of leadership experience developing and launching technology businesses. Before co-founding CertifID, Tyler led new product development at BCG Digital Ventures for Mercedes-Benz, First American Financial, Boston Scientific, and Aflac.
Phishing remains the #1 entry point for real estate wire fraud. According to CertifID's 2025 State of Wire Fraud report, nearly $500 million in annual losses stem from business email compromise attacks targeting the real estate industry.
This article examines 15 real phishing examples, reveals the red flags you must recognize, and demonstrates how removing email from money movement becomes the only reliable defense against increasingly clever attackers.
Phishing emails are fraudulent messages designed to impersonate trusted parties and manipulate recipients into revealing sensitive information or authorizing financial transactions.Â
In real estate, attackers commonly pose as lenders, underwriters, sellers, or even your own clients to redirect funds or capture wire instructions.
Consider a typical mortgage payoff fraud: You receive what appears to be a legitimate email from Mr. Cooper, complete with proper branding and formatting, requesting updated payoff information for a closing scheduled tomorrow.
The sender's address looks authentic, the urgency feels reasonable, and the request seems routineâuntil you discover that $275,000 has been wired to a fraudulent account.
These attacks work because they prey on the trust and time pressure built into real estate transactions.
If this feels uncomfortably plausible, youâre right. In the video below, CertifIDâs Tom Cronkright and Kimberly Casanova show how fraudsters use âroutineâ callbacks in real payoff fraud and what to do instead.
Phishing attacks succeed through social engineeringâthe psychological manipulation of human trust and decision-making under pressure. Fraudsters understand that title professionals work in high-stress environments where quick responses often keep a closing on track.
The mechanics involve techniques like:Â
Modern attackers use AI to study email patterns and generate messages that look and read like the real thing.
The problem with manual verification becomes clear during peak closing periods. When your team processes hundreds of files monthly, the callback-and-verify approach breaks down.
Checking emails on mobile devices after hours, pressure to respond quickly to "urgent" requests, and sheer volume make it easier for sophisticated fakes to slip through.
Types of phishing emails include:
Real estate has a perfect storm for fraud: large transaction amounts, multiple parties communicating across fragmented systems, and historically low cybersecurity infrastructure.
With the U.S. median home sale price in Q2 2025 reaching $410,800, each successful attack yields hundreds of thousands of dollars.
The industry's vulnerability stems from its decentralized nature. Unlike banking, which invested heavily in cybersecurity following decades of attacks, real estate relies on thousands of independent title companies and law firms with varying security sophistication. State-by-state regulation creates inconsistent standards.
Title companies and closing attorneys still rely on email for critical tasks like verifying mortgage payoffs, confirming seller identities, and sending buyer wire instructions.
Attorneys and clients keep using email because it feels familiar, but that dependence gives fraudsters more chances to slip in and divert funds.
CertifID's analysis shows that once a company experiences a single high-risk transaction flag, the rate of suspicious activity increases up to 6x compared to peer firms. This suggests organized criminal groups systematically target specific businesses, hoping to exploit process gaps during busy closings.
Every inbox functions as an unregulated payment rail, capable of authorizing hundreds of thousands of dollars in wire transfers without meaningful verification. Unlike banking systems with multi-factor authentication and fraud monitoring, email offers no safeguards to verify senders or wire instructions.
A single successful attack can wipe out your annual technology budget and threaten your business's survival. Traditional insurance policies often exclude wire fraud losses, leaving you personally liable for client funds.
The regulatory landscape adds another risk layer. As wire fraud incidents increase, state bar associations and insurance carriers scrutinize firms' cybersecurity practices more closely, potentially imposing higher premiums, coverage exclusions, or regulatory sanctions.
Document-sharing platforms like Dropbox, Google Docs, and DocuSign are common targets in real estate transactions. These phishing emails are sent from generic-sounding names or compromised accounts of people you know. If a contactâs account was hacked, their email list can be used to spread the scam.
Clicking the link takes you to a fake login page that captures credentials while appearing nearly identical to the real Dropbox interface.
Red flags:
Like the Dropbox scam, this one starts with an email supposedly from someone you know.
Unlike the Dropbox scam, however, clicking on the link takes you to a real Google Docs page, and asks the user to grant permission to a third-party application entitled âGoogle Docs,â despite the fact it is not associated with the platformÂ
Google has since added stricter rules for third-party apps, including restrictions on what names they can use.
If you grant access, fraudsters can use your login credentials to obtain your personal information, including your contacts list, to spread the attack.
Red flags:
The DocuSign phishing email mimics the companyâs document completion notifications. They often claim "Your document has been completed" and use authentic branding, logos, and the familar blue color scheme.
The email comes from a suspicious sender address, and clicking the "VIEW COMPLETED DOCUMENTS" button redirects you to a malicious domain instead of DocuSign's official servers.
The attack works because people trust DocuSign notifications, particularly in real estate transactions where document signing is routine.Â
Legitimate DocuSign emails always include a 32-character security code in the "Alternate Signing Method" section. Phishing emails leave this out.
Red flags:
A Bank of America phishing email uses authentic branding to claim an account has been suspended due to "unusual activity detected."Â
The email creates urgency by threatening account limitations unless the recipient downloads an HTML attachment for "verification." The message looks professional with clean formatting, footer disclaimers, and contact details that appear legitimate.
However, legitimate banks never ask customers to download attachments to verify their accounts. The email uses a generic greeting like "Valued Customer" and try to pressure the reader with threats debit or credit card limitations.Â
The emailâs polished appearance makes it harder to detect, especially for title professionals juggling multiple business banking relationships.
Red flags:
Wells Fargo phishing emails mimic the bankâs red and yellow branding and warn that an account has been locked pending verification. The email claims purchases and balance transfers will be declined, creating urgency around frozen access. Â
It directs recipients to what looks like the correct URL to unlock their account. The emailâs professional formatting makes the request appear credible.
However, the sender domain differs from Wells Fargoâs official wellsfargo.com; in this case itâs noreply@weiis-mail.com. Phishing domains commonly add hyphens, swap letters, or insert extra words to mimic a real address.Â
These tactics can bypass email security filters and exploit recipientsâ unfamiliarity with text-based phishing. Wells Online is also not a legitimate name used by Wells Fargo.Â
Red flags:
This PayPal phishing example uses the companyâs blue branding to announce that an unexpected $479.35 charge will be deducted from the recipient's account.
The email creates panic by claiming unauthorized charges while providing a toll-free support number for "cancellation." It includes convincing details like invoice numbers and dates.
However, the message uses generic salutation "Dear Customer" and asks you to call a phone number rather than directing users to PayPal's official website, which legitimate PayPal notifications always do.
Red flags:
The same tactics used in document and bank phishing can also target your email credentials, which can give scammers access to the personâs contactsâand, potentially, their banking, shopping, or social media accounts.
Various forms of âvalidate your accountâ Gmail messages have made their rounds, telling users to verify their information to avoid account suspension.Â
They are taken to a real-looking log-in screen, and scammers use their information to access, among other things, the userâs contact list and spread malware or more validation emails.Â
Users should take note of the URLâwhich is not actually a Google oneâand the fact that, once theyâve entered their email address, their profile picture does not appear before theyâre asked for their password.
Email provider phishing scams are especially troubling for real estate agents. Many agents still use personal Google email accounts to communicate with clients, even though experts and brokerages advise against it.
A scammer can simply find their email on a real estate site, Facebook, or LinkedIn, and tailor an attack based on that information. From there, they can steal client details and possibly trick them into sending money or banking credentials, all while pretending to be the agent.
A recent Zillow-based scam was sent to real estate agents, complete with authentic-looking logos, and congratulated the user on their new leads from ZillowAds, which had to be âunlockedâ with their contact details and a fee of $5.00.Â
At least one agent was tricked into providing their credit card information, and missed the only potentially obvious red flag: the fact the domain name was âZillow.proâ instead of a .com address.
Virus and malware attacks appear to come from an internal administrator sending an "Important - Internal ONLY" message with a ZIP file attachment (e.g., internal_04531572.zip).
The email is professionally formatted with confidentiality notices, legal copyright information, and detailed file validity data to appear legitimate. The extensive boilerplate text about intellectual property rights and legal consequences creates an illusion of authenticity.
However, the ZIP attachment contains malware that encrypts across your computer once downloaded. The sender's domain, "tomokuhus.se," doesn't match typical internal company addresses, and legitimate internal communications rarely require downloading compressed files for routine business.
This Facebook phishing email mimics the platformâs branding, uses a personalized greeting "Hi Paulo.", This may come from a look-alike address such as "security@facebookmail.com" and include a reset code (66631625) and "Change password" button to complete the illusion.
Red flags:
Attackers send users an email with the Xfinity logo and layout. This message claims to be a confirmation to verify youâve authorized a payment on a credit card.Â
Since itâs a fake number, it confuses the target and entices them to click on the âComcast Billing Invoiceâ link in the hopes of understanding or fixing the error.
This link leads to a fake domain that prompts the user to download a .php file they believe to be the invoice. Instead, it contains a virus that infects your computer. This malware can compromise secure information stored therein.
Red flags:
Amazon phishing emails like this use Amazon's branding and warn, "We have locked your Amazon account and all pending orders," citing billing information mismatches. The email creates urgency by threatening order cancellation within 3 days unless the recipient clicks "Check Now" to verify billing details.
Red flags:
This inheritance scam email uses formal letterhead formatting to announce a ÂŁ32 million inheritance opportunity from a deceased Libyan national.Â
The scammer poses as "Mr. Jerry Smith," a bank auditor who discovered an abandoned account, offering 35% of funds in exchange for serving as "next of kin." The message creates urgency by claiming funds will be forfeited to the government treasury unless claimed immediately.
Red flags:
Sophisticated settlement scams use professional property agent branding to request large sums of money. In this Australian example, the scammer demands an urgent $80,500 deposit transfer to a "Trust Account."Â
The email appears to come from a legitimate conveyancer with authentic formatting and specific BSB/account details. It creates artificial urgency with a deadline of "by 5 April at 5:00pm," and warns that "failure to provide will result in forfeiture of contract."
Red flags:
Deepfake impersonation scams use AI-generated video to pose as property sellers during verification calls, supported by fake documents such as driver's licenses, utility bills, and property records.Â
The fraudsters create real-time video interactions that respond to verification questions while presenting authentic-looking supporting documentation. The technology exploits traditional verification methods by making visual and audio confirmation unreliable.
Red flags:
AI-powered fraud eliminates the traditional warning signs, like poor grammar and obvious formatting errors. With these cues gone, the stakes are higher for industries like real estate, where clients now demand stronger protection.Â
Our data shows 79% of consumers are willing to pay more for secure real estate services. This proves that preventing wire fraud is now both a necessity and a competitive advantage.
The next step is clear: Remove email from money movement entirely. In an industry where mistakes cost hundreds of thousands, you can't afford anything less than full protection.
Co-founder & CEO
Tyler brings a decade of leadership experience developing and launching technology businesses. Before co-founding CertifID, Tyler led new product development at BCG Digital Ventures for Mercedes-Benz, First American Financial, Boston Scientific, and Aflac.