Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money phishing is unique in seeking your personal data, usually in the form of passwords and bank details.
This is the defining difference we will use here. If the scam is after money, it is a scam. If it is after credentials, it is phishing. Whether its vishing (by phone), smishing (by chat), whaling (after the big fish), or spear-phishing (targeted phishing), its all basically phishing for personal data.
There are technology aids to prevent phishing but given the FBIs latest report notes 114,702 phishing attacks in 2019, ultimately leading to the loss of nearly $58 million, it is fair to say that they are not foolproof. The best way to protect yourself against phishing attacks is to recognize them. The best way to recognize them is through a knowledge of their anatomy and structure and how they work.
The Phish
The two primary categories of phishing are standard and spear-phishing. The former is untargeted, large-scale phishing usually delivered in spam campaigns. This is often known as spray and pray phishing. The latter, spear-phishing, is where an individual or small group of related people, are precisely targeted.
We have probably all been subject to and have recognized a spray and pray campaign. A quick look in our spam folder will probably show dozens, all filtered out by our email service provider. They are relatively easy to recognize, often including typos, grammatical errors and have a general unprofessional appearance. According to the 2020 Data Breach Investigations Report, click rates on phishing emails are at an all-time low at just 3.4%.
This makes spray and pray a numbers game. Any given phishing message has a 96.6% chance of being ignored by its victim, even if it makes it through the email services automated filters. However, this means that for every hundred messages successfully sent in a spray-and-pray campaign, we can expect three or four people to fall victim to it. If a campaign manages to distribute 100,000 fraudulent messages, this gives the hackers 3,400 compromised victims.
Spear phishing is more sophisticated, often more technical and is potentially more damaging than spray-and-pray phishing. Spear-phishers will research their target or targets using different forms of OSINT (open source intelligence, such as social media), gathering information on the targets habits, which services they use, their contacts and more. With this information built into the email, the message can appear to come from a trusted source, and will often be convincing and compelling.
It is worth mentioning that since spray and pray phishing is easy to detect, many people believe they cannot be tricked by any phishing. This is dangerous. There is probably no one in the world who could not be spear-phished. Consider the case of the Telegraph journalist who effectively challenged a white hat hacker to break into her computer. He did just that by spear-phishing her with the opportunity for a compelling news story combined with a sense of urgency.
Victims succumb to phishing attacks because of the combination of the structure of the email and the lure it contains, and the inclusion of various emotional triggers that elicit the response required by the attacker. Well discuss these next as the anatomy of a phish and the emotional triggers. If we understand how we are phished, we will be better equipped to recognize and ignore (or report) a phishing attack when it happens.
Anatomy of a phish
Well focus on email phishing, as this is both the most common vector for phishing attacks and allows us to analyze the complete anatomy of phishing messages.
The visible email header is that part of the email we can see before we open it. It is the attackers first opportunity to catch our attention, but is also the point at which many spray and pray campaigns immediately fail. The intent is to appear to be an interesting subject from a trusted source. A spray and pray example from my own spam folder is from _ nooreply[@]l1i.affpartners.com. High Priority is not a person, but is intended to add a sense of urgency to the email (see emotional triggers below), encouraging potential victims to open it before stopping to think. A moments closer inspection lets us see more holes: l1i.affpartners.com doesnt look like a legitimate domain, and nooreply is probably a typo for the more usual no.reply or no-reply.
Spear-phishing attacks can be more subtle. If you have a friend or colleague with the email address John.Smith[@]company.com, attackers may message you as John.Smith[@]google.com, using an open email service and hoping you dont notice the different domain.
The subject line of the header is key to a good phish it is the primary factor in what makes us decide whether to read the email or not. It must be short enough to be easily processed by the target, but needs to contain strong emotional triggers to make itself hard to ignore. Effective phishing subjects will leverage either a sense of threat, urgency, or the prospect of gain for the user. According to research by KnowBe4, the most clicked phishing subject is Change of Password Required Immediately, with similar lines accounting for another three of the top 10 most clicked phishing subjects. International disasters also offer compelling subjects, with curiosity, fear and compassion being typical emotional triggers and the COVID-19 pandemic is a clear illustration.
With all forms of email scam, the body, or content, contains the lure. Loosely, the lure can be seen as the bait that is used to tempt the phished to take the hook (the payload, see below).
By this stage, the attacker has successfully convinced the target to open and read the email. Now the lure in the email body must convince the victim to click a link or respond. The lure is typically full of emotional triggers designed to engage the victim favorably. Consider this example of a spray-and-pray lure:
Leaving aside that I never do online surveys, the grammatical and spelling errors as well as odd syntax typical of spray and pray attacks make it obvious that this is a phish. The two most obvious emotional triggers are greed (who wouldnt want a free iPhone?), and urgency (the target is given just 24 hours, or this opportunity will be taken away). Other common phishing lures range from commonplace and plausible (but fraudulent) invoices and delivery notifications to more grandiose legal threats, or simply masquerading as charitable or governmental organizations.
The payload is the crux of the phishing email. The most common payload is a malicious link; this can lead to a malicious or compromised website where a falsified login screen harvests credentials and sends them to the attacker. The link can be in the body of the email or found in an attachment.
Any payload link is usually disguised. In the above example, the click here button is the payload. If you hover the mouse cursor above a link, most browsers will display the URL in the bottom left of the screen, allowing you to see the actual destination. To counter this, many phishers are using URL shorteners like Bitly to hide the real destination our example shows as https:// t.co/YwTb24fxMI ?amp=1. URL obfuscation is always suspicious, so any email containing a shortened or obfuscated URL should probably be treated as phishing until proven otherwise.
Emotional triggers
The header, the subject, the lure and the payload form the fundamental structure of a phish, but success or failure rests on the emotional triggers contained within the message. Emotional triggers are there to prompt an immediate, unthinking, knee-jerk reaction, because the more we can think, analyze and consider a phishing message, the less likely it is to succeed. Consequently, it is important to give ourselves time. Even if an email appears both urgent and legitimate, setting a rule to never respond to any email without a small thinking period can go a long way to helping us keep a cool head and seeing through the emotional manipulation.
The main emotional triggers are listed below, but it is important to remember that any combination of them can be included in a phishing email, and the more sophisticated attacks will make use of them in very subtle ways.
Greed may be the earliest emotional trigger that phishing scams have tried to exploit. The greed trigger goes even further back than the infamous Nigerian Prince scams, but there are still many attempts to capitalize on greed to this day. In late 2019, Microsoft employees were targeted with a phishing campaign purporting to disclose upcoming salary increases. The payload was a link to a fraudulent login screen designed to harvest Microsoft Office login credentials. Two axioms are always important to bear in mind when opening any email: nothing in life is free; and if something seems too good to be true, it probably is.
Urgency is commonly present in phishing. Rather than being an effective emotional trigger by itself, urgency must work in conjunction with other emotional triggers: You have a free gift but must claim it within 24 hours. We have embarrassing information to share with all your contacts if you dont respond by midnight. If the scammer can remove the victims thinking time or push them into a panic state, it drastically increases the chance of successfully tricking the target.
Good mental defenses against urgency are difficult to cultivate because urgency is specifically designed to disrupt those mental defenses. However, it is useful to remember that if you receive an email or a message that fills you with dread, its likely that whoever sent it wants you to panic. Counterintuitively, taking feelings of urgency as a sign that its time to stop and think carefully can help foil most of even the most effective phishing campaigns.
Fear can apply in a lot of different situations and contexts. There is often a strong interplay with urgency, especially when it comes to fear of bad consequences if we dont respond immediately. Fear plus urgency often equals panic, and can be used in legal threats or threats to release intimate personal information.
Fear can also be less visceral fear of missing an opportunity and fear of being uninformed can be equally compelling emotional triggers. Phishing scams often prey on both fear of danger, and fear of missing out (FOMO).
The COVID-19 pandemic has given rise to a spate of phishing scams that target both of these aspects of fear; the deadly and contagious infection has many of us fearing for our safety, and there is a strong desire for us all to stay informed and up to date on all the latest developments (or obtain one of a very limited supply of (non-existent) vaccines).
While most emotional triggers exploit our base instincts, our better nature can also be used against us. Any crisis, emergency or disaster tends to cause a spike in phishing emails attempting to capitalize on it. Phishing emails can impersonate a charitable organization or a person in need. The spate of tropical storms over 2018 and 2019 prompted a variety of organizations (including the FCC) to issue official warnings about post-disaster scams, urging users to verify any charitys credentials carefully. These so-called charities arent after your donation, theyre after your bank details.
Curiosity can be a particularly dangerous trigger, as we often dont consider that just having a look can put us in danger. The same principles that apply to clickbait articles online can be used in phishing; any sufficiently sensationalist subject line could be irresistible to our curiosity: you just wont believe entry number 7! In the wake of Kobe Bryants death earlier this year, clickbait phishing with subjects like amazing, shocking, or never before seen! became so widespread that it prompted the Better Business Bureau to issue an official warning to consumers.
Technological defenses against phishing
Businesses and cybersecurity organizations are always looking for ways to prevent phishing with technology. As much as these technological solutions may help to mitigate phishing and reduce the exposure of users to phishing scams, the continuing prevalence of phishing and the damage it causes mean we have to consider them a failure so far. According to the 2020 DBIR, 22% of all breaches over the past year have involved phishing, while around 80% of all social type attacks are phishing messages of some kind.
Browser developers maintain blacklists of known phishing websites which can help prevent users visiting malicious URLs. This is only partially effective, since the average phishing campaign lasts for just 12 minutes the malicious website changes before it can be added to the blacklist.
Artificial intelligence is also used to scan emails to detect phishing. This can be effective with spray-and-pray phishing, but AI products entail high expenses, and tend to be useful only to companies rather than consumers.
DMARC short for Domain-based Message Authentication, Reporting & Conformance is a technology that unequivocally works against phishing, some of the time. We wont go into the details of the technology (DMARC is built on the top of other technologies, notably SPF and DKIM, that were also designed to counteract phishing), but just explain why it works when it works, and why it doesnt ultimately help the end-user.
DMARC works against what is known as exact domain phishing. This is where the phishing email appears to come from the exact, expected, and correct domain (as shown in the From line of the header). If DMARC is fully installed by a service provider, the technology confirms that the message has genuinely come from that domain. If not, it assumes phishing and blocks it.
To demonstrate how well this works, consider the UKs tax authority, HMRC. In 2016, this domain was the 16th most phished domain in the world. HMRC then installed DMARC, and has since dropped to number 126 in the world. During this period, DMARC stopped 300 million attempted phishing emails.
However, DMARC can do nothing to stop non-exact domain phishing. This is where the from domain in the email header is a look-alike rather than the genuine exact domain. So, for example, I could register the domain hnnrc[.]co.uk (or hnnrc[.]uk or hnnrc[.]org.uk or hnnrc[.]me.uk all of which were available at the time of writing in the genuine expectation that a percentage of recipients would not notice that hnnrc is not hmrc.
The second weakness in DMARC is that only a tiny percentage of firms have implemented it. But the real weakness is that the end-user has no way of knowing whether a received email has been DMARC-checked or not. Consequently, all received emails need to be considered suspect, whether or not DMARC is involved.
There is an attempt to solve the last problem with the introduction of yet another technology: BIMI, or Brand Indicators for Message Identification. BIMI only works where DMARC has been fully and correctly implemented. If the email service provider knows through DMARC that the email is genuine, and if the sending domain has implemented BIMI, the email service will insert the domains logo into the email list. So, if you check your email list and see the expected sender logo, then you can be confident the email is genuine and not a phishing email.
But again, only a tiny percentage of organizations have fully implemented DMARC, and only a tiny percentage of those have implemented BIMI. It is not likely to happen, but exact domain phishing could be eliminated if DMARC and BIMI were required email standards. In the meantime, from the end-users perspective, DMARC does nothing to solve the phishing problem even though it works.
Summary
We are much more likely to be fooled by phishing than we think. For example, in a survey conducted by PhishMe last year, only 10.4% of respondents believed that fear was an effective motivating factor in opening an email. However, a simulated phishing email threatening the recipient with a legal complaint was opened by 44% of participants. Just 7.8% believed they would be taken in by the prospect of an opportunity, but a spoof phish purporting that the targets were eligible for medical insurance was clicked by 39.2% of participants.
It is often said that the weakest link in security is the user, but with enough awareness and understanding, this doesnt need to be the case. Technology does not yet have a reliable solution to phishing, and these attacks cannot be dealt with by anti-malware or general cybersecurity due to their psychological nature. If we can recognize phishing attacks by understanding the anatomy of a phish, stay calm and vigilant, and not allow our emotional buttons to be pushed, users can become the strongest link in security.
More here:
The Anatomy Of A Phish | Avast - Security Boulevard
- Anatomy of the Phillips curve - CEPR - June 10th, 2025 [June 10th, 2025]
- Don't Expect Arizona To Return To Grey's Anatomy Anytime Soon After This Exciting Jessica Capshaw Update - Screen Rant - June 10th, 2025 [June 10th, 2025]
- Pacers vs. Thunder NBA Finals: Anatomy of a comeback How the Pacers once again did the unthinkable - Yahoo Sports - June 10th, 2025 [June 10th, 2025]
- Anatomy Of A Debacle: How Mayor Adams Went From Visionary to Bully on E-Bikes - Streetsblog New York City - June 10th, 2025 [June 10th, 2025]
- Anatomy of an At-Bat: How Matt Wallner Conquered Kevin Gausman - Twins Daily - June 10th, 2025 [June 10th, 2025]
- Enhancing anatomy education with virtual reality: integrating three-dimensional models for improved learning efficiency and student satisfaction -... - June 10th, 2025 [June 10th, 2025]
- Greys Anatomy Season 22 Cast Updates: Just Two Actors Confirmed After Shocking Finale, Though 7 More Stars Have Deals to Return - Just Jared - June 10th, 2025 [June 10th, 2025]
- S11E20: 5 Things You Should Know About Tactical Anatomy With Steve Moses - concealedcarry.com - June 10th, 2025 [June 10th, 2025]
- Airport security held Greys Anatomy star for an hour over snack - Yahoo - June 10th, 2025 [June 10th, 2025]
- Wine Walk: The anatomy of a wine bottle, its cork and how it is sealed - The Courier of Montgomery County - June 10th, 2025 [June 10th, 2025]
- MSc grad reflects on learning and legacy in the anatomy lab - Schulich School of Medicine & Dentistry - June 10th, 2025 [June 10th, 2025]
- Greys Anatomy star Ellen Pompeo says TSA detained her over sunflower seeds - Washington Times - June 10th, 2025 [June 10th, 2025]
- Cardiac Anatomy & Orientation of the 3D Heart Part 3 - University of Nebraska Medical Center - June 1st, 2025 [June 1st, 2025]
- Greys Anatomy Star Chris Carmack Teases Link and Jos Season 22 Storyline: Anything Can Happen - Life & Style - June 1st, 2025 [June 1st, 2025]
- Greys Anatomy Star Reveals Her Secret to Flying Under the Radar on Planes - EntertainmentNow - June 1st, 2025 [June 1st, 2025]
- None of her preserved anatomy looked like any other fossil. Scientists Realize That A Fossil Thats Millions Of Years Old Was Fossilized From The... - June 1st, 2025 [June 1st, 2025]
- Greys Anatomy star is fighting to get Denzel Washington on the show: 'Im hoping he does it' - GeekSided - June 1st, 2025 [June 1st, 2025]
- No, Sandra Oh is not watching Greys Anatomy in her free time - GeekSided - June 1st, 2025 [June 1st, 2025]
- Brigitte and Emmanuel Macron the anatomy of a slap - The Spectator World - June 1st, 2025 [June 1st, 2025]
- Sandra Oh Reveals If She Watches Grey's Anatomy Reruns 11 Years Since Cristina Yang Left The Show - Screen Rant - June 1st, 2025 [June 1st, 2025]
- Fan-Favorite Greys Anatomy Star Sandra Oh Reveals Whether She Still Watches the Show or Not - Collider - June 1st, 2025 [June 1st, 2025]
- Greys Anatomy: Why Did Sandra Oh Leave The Show? Revisiting Her Shocking Exit & Remarkable Legacy - Koimoi - June 1st, 2025 [June 1st, 2025]
- Warfare at night, deepfakes by day: The anatomy of a rumour in modern era conflicts - The Indian Express - June 1st, 2025 [June 1st, 2025]
- Greys Anatomy Hunk, 59, Turns Heads in Rare Monaco Outing With Wife - parade.com - June 1st, 2025 [June 1st, 2025]
- Grey's Anatomy season 22 confirmed to premiere in fall 2025 - GeekSided - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy season 21 finale: Where to watch for free tonight - MassLive - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Showrunner Meg Marinis Confirms Your Fears After That Explosive Cliffhanger Finale - The Hollywood Reporter - May 21st, 2025 [May 21st, 2025]
- 'Grey's Anatomy' Recap: Did Firebomb Just Kill Off Lucas Adams, Teddy Altman, or Miranda Bailey? - TV Insider - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy season 22 will not introduce any major new additions: 'I have a big enough cast as it is' - GeekSided - May 21st, 2025 [May 21st, 2025]
- 8 Biggest Unanswered Questions & Mysteries After The Grey's Anatomy Season 21 Finale - Screen Rant - May 21st, 2025 [May 21st, 2025]
- Only 2 Grey's Anatomy characters are confirmed to be safe in season 22 - GeekSided - May 21st, 2025 [May 21st, 2025]
- 'Grey's Anatomy': Meredith Puts Herself in Harm's Way Once Again as a Hostage Situation Leaves Grey Sloan Reeling - People.com - May 21st, 2025 [May 21st, 2025]
- This Greys Anatomy character death still remains the shows most gut-wrenching - GeekSided - May 21st, 2025 [May 21st, 2025]
- Anatomy Of A Perfect Trip Cybercaf Across The Algarve - Quartersnacks - May 21st, 2025 [May 21st, 2025]
- Why the Greys Anatomy Hospital Is Facing Another Bomb Threat in Season 21 Finale - E! Online - May 21st, 2025 [May 21st, 2025]
- Streaming Set Another Record In April, But Greys Anatomy And The White Lotus Prove Linears Reach, Nielsen Says - Deadline - May 21st, 2025 [May 21st, 2025]
- 'Grey's Anatomy' Boss Answers the Biggest Questions From That Explosive Season Finale (Exclusive) - parade.com - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Season-Finale Recap: Explosions in the Sky - Vulture - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Boss Breaks Down That Explosive Season 21 Finale Cliffhanger, Merediths Surprising Decision - TheWrap - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy boss confirms one new star will return in season 22 - GeekSided - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Season 21 Finale Review: I Cant Believe The Show Pulled Off This Cliffhanger Reminiscent Of Its Glory Days - Screen Rant - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy Finale Preview: Chris Carmack Teases 'Be Afraid' - Us Weekly - May 21st, 2025 [May 21st, 2025]
- ABC NEWS STUDIOS ANNOUNCES HEY BEAUTIFUL: ANATOMY OF A ROMANCE SCAM BEGINS STREAMING MAY 20, ONLY ON HULU - dgepress.com - May 21st, 2025 [May 21st, 2025]
- 5 Grey's Anatomy characters who might not return for season 22 after that fiery cliffhanger - GeekSided - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Explosion & Possible Character Deaths: Showrunner Explains Why Shes Doing This to Link & Jo - Just Jared - May 21st, 2025 [May 21st, 2025]
- 'Grey's Anatomy' season 21 ending explained: Is Meredith returning to Grey Sloan for good? - Entertainment Weekly - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy Season 21 Finally Resolved Its Most Frustrating Plot In Limbo - Screen Rant - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy Season 21 Ending Explained: Amelia Survives A Near-Death Experience While Tragedy Strikes A Fan-Favorite - Screen Rant - May 21st, 2025 [May 21st, 2025]
- James Pickens Jr. Says Every Day Is an Adventure on 'Greys Anatomy' (Exclusive) - People.com - May 21st, 2025 [May 21st, 2025]
- The Doctor Is Out: Greys Anatomy Ends Season 21 With a Devastating Death - Yahoo - May 21st, 2025 [May 21st, 2025]
- Greys Anatomy Season 22 Cast: Only 2 Characters Confirmed Alive After Finale, Though 7 More Actors Have Deals to Return - Just Jared - May 21st, 2025 [May 21st, 2025]
- 'Grey's Anatomy' Interview: James Pickens Jr. Reflects on Pilot and Reveals Season 22 Hopes (Exclusive) - TV Insider - May 21st, 2025 [May 21st, 2025]
- Grey's Anatomy tells fans to "brace yourself" for season finale that's as dramatic as this iconic episode - Digital Spy - May 21st, 2025 [May 21st, 2025]
- I Can't Believe Grey's Anatomy Still Hasn't Told Us Who Adams' Mother Is - Cinemablend - May 21st, 2025 [May 21st, 2025]
- Katherine Heigl Shares Why She's Grateful Her Daughters Aren't Interested in Grey's Anatomy (Exclusive) - parade.com - May 12th, 2025 [May 12th, 2025]
- 'Grey's Anatomy' Fans Are Just Realizing This Fun Fact About the Series That Affects All but 1 Episode - People.com - May 12th, 2025 [May 12th, 2025]
- In a Nutshell: Turning anatomy education into online sensation - Ohio University - May 12th, 2025 [May 12th, 2025]
- 'Grey's Anatomy' Gets Musical Again: Link Serenades Jo With Song at the Wedding Altar - TV Insider - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy Boss Unpacks Jo and Links Momentous Wedding Song, Teases Bonkers Season 21 Finale - TheWrap - May 12th, 2025 [May 12th, 2025]
- Generating cervical anatomy labels using a deep ensemble multi-class segmentation model applied to transvaginal ultrasound images - Nature - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy creator Shonda Rhimes reveals the hardest death she had to write - Yahoo - May 12th, 2025 [May 12th, 2025]
- Katherine Heigl Reveals What 1 Medical Trick She Thinks She Could Still Do After Grey's Anatomy (Exclusive) - parade.com - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy Season 21, Episode 17 Review: As A Long-Time Fan, I Loved This Romantic & Poignant Episode That Felt Like Classic Greys - Screen... - May 12th, 2025 [May 12th, 2025]
- As One Greys Anatomy Couple Weds, Another Breaks Up and a Third Relationship Lands on Life Support - TVLine - May 12th, 2025 [May 12th, 2025]
- Every Wedding on Greys Anatomy , Ranked - Vulture - May 12th, 2025 [May 12th, 2025]
- 'Greys Anatomy': Link Surprises Jo at Their Wedding, Owen Holds onto the Past and 1 Couple Calls It Quits - People.com - May 12th, 2025 [May 12th, 2025]
- Here comes the bride: Where to stream Greys Anatomy for FREE - PennLive.com - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy Preview: Will Link and Jo I Do It Right On Their Wedding Day? Plus, [Spoiler]s Back - TVLine - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy boss reveals the disappointing reason Meredith missed Jo and Links wedding - GeekSided - May 12th, 2025 [May 12th, 2025]
- Anatomy Of Startup Governance Issues, Funding Zooms & More - StartupNews.fyi - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy Shock: Lucas and Simone Split Will Fans Even Miss Them? - Decatur Metro - May 12th, 2025 [May 12th, 2025]
- 9 Secrets of the Greys Anatomy Sets Superfans Need to Know - Architectural Digest - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy Continues to Ignore a Key Character's Storyline (& It's Frustrating Fans) - Comic Book Resources - May 12th, 2025 [May 12th, 2025]
- Jo & Link's Unique Wedding Set-Up Is Exactly Why Their Romance Works In Grey's Anatomy - Screen Rant - May 12th, 2025 [May 12th, 2025]
- Greys Anatomy creator Shonda Rhimes reveals the hardest death she had to write - The Independent - May 12th, 2025 [May 12th, 2025]
- Grey's Anatomy fans are just realizing clever aspect of 'every episode' after 20 years - The Mirror US - May 12th, 2025 [May 12th, 2025]
- Did the Success of The Substance and Anatomy of a Fall Finally Teach Cannes a Lesson? - IndieWire - May 12th, 2025 [May 12th, 2025]
- Grey's Anatomy fans floored after spotting 'hidden message' in every episode - Irish Star - May 12th, 2025 [May 12th, 2025]
- Anatomy of an apprehension: Where are you taking the baby? - Maple Ridge-Pitt Meadows News - May 12th, 2025 [May 12th, 2025]
- Isaiah Washington Says Sandra Oh Brought Him Back on Greys Anatomy Years After Firing - E! Online - April 27th, 2025 [April 27th, 2025]