The 3 Most Common Slack Scams — and How to Spot Them
Nov 12, 2025
Pawel Radzyminski

Slack is where your team collaborates — which also makes it a prime target for attackers. Scammers know that if they can blend into your workspace, they can get users to click, download, or trust almost anything.
Let’s break down the three most common Slack attacks, and how to instantly recognize them — with real-world examples.
1️⃣ The Impersonation Scam
Attackers pretend to be your CEO, HR lead, or IT admin — pressuring you to act fast.
🚩 Red Flags
Display name looks right — but the Slack handle doesn't match
Urgent tone (“Need this ASAP”)
Weird requests involving money, sensitive info, or login approvals
They DM first without prior context
🧪 Example Mock Message
John Smith (CEO)
➤ @jsmith-admin
“Hey — I need you to approve a vendor invoice urgently. Just share your MFA code and I’ll handle it. Board meeting in 2 min — please hurry!”
✅ How to Verify
Check their full profile — does the account belong to your org?
Confirm through another channel (voice call, known email)
Report suspicious accounts immediately
2️⃣ Fake HR or Payroll “Update”
Scammers prey on trust by pretending to be your internal teams.
🚩 Red Flags
“New benefits program” or “policy update” that feels out of the blue
Redirects you to external forms/files
Misspellings or generic sender title (“HR Department”)
🧪 Example Mock Message
Human Resources Team
“We’re updating our health insurance benefits. Please download the file and sign the attached form by EOD.”
📎 Benefits_Update_Nov2025.pdf
(Opens malware. Yikes.)
✅ How to Verify
HR announcements normally happen in official channels
Hover links: does it open a file-sharing site unknown to you?
Ask HR directly — never from the message source
3️⃣ The Malicious Link Drop
This is the silent assassin — looks like a normal resource, but leads to credential harvesting.
🚩 Red Flags
Strange link formatting (hidden redirects, .ru domains, shortened URLs)
Unexpected “Google Docs/Notion” requests
Shared in busy channels to blend in
🧪 Example Mock Message
Carlos D. — Marketing
“Slide deck for today’s meeting — pls review 😅”
🔗
docs-google-drive-review[.]co/login
Notice the extra hyphens and .co instead of .com — subtle, dangerous
✅ How to Verify
Always expand shortened URLs
Never sign in somewhere you didn’t expect to be logged out
Quickly check with the sender in thread: “Did you mean to share this?”
How Griffo Stops These Scams Before Humans Even Notice
Griffo lives directly in your Slack workspace — detecting:
✅ Executive impersonation
✅ Suspicious new accounts joining channels
✅ Malicious links and uploaded files
✅ High-risk social engineering patterns
And alerts you in real-time — like having a cybersecurity expert watching every message 24/7.
📌 Want to keep your team safe?
Invite Griffo to your Slack and secure your workspace in under 2 minutes.
👉 Let’s stop threats before they become incidents.