The email notice seemed genuine enough. It had a bright orange background and red letters — the colors of the DHL shipping company. It was the DHL logo. There was a tracking number, which went to a webpage with the “EXPRESS” trademark of DHL on it. On that page was also a pulsating button saying “Confirm.”
I backed out of that and went back to the email.
In the “From:” field of the email was “DHL.” Tap on that (if on a smartphone), or hover over it with the mouse arrow (if on a computer), and the actual address will sometimes appear. In this case, the domain name (what appears after the @ symbol) should be DHL. Instead, it was the domain of a website that had obviously been compromised as a cover for the email.
Something is “phishy.”
For the uninitiated, that term, according to Wikipedia, is used “where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.”