Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money phishing is unique in seeking your personal data, usually in the form of passwords and bank details.
This is the defining difference we will use here. If the scam is after money, it is a scam. If it is after credentials, it is phishing. Whether its vishing (by phone), smishing (by chat), whaling (after the big fish), or spear-phishing (targeted phishing), its all basically phishing for personal data.
There are technology aids to prevent phishing but given the FBIs latest report notes 114,702 phishing attacks in 2019, ultimately leading to the loss of nearly $58 million, it is fair to say that they are not foolproof. The best way to protect yourself against phishing attacks is to recognize them. The best way to recognize them is through a knowledge of their anatomy and structure and how they work.
The Phish
The two primary categories of phishing are standard and spear-phishing. The former is untargeted, large-scale phishing usually delivered in spam campaigns. This is often known as spray and pray phishing. The latter, spear-phishing, is where an individual or small group of related people, are precisely targeted.
We have probably all been subject to and have recognized a spray and pray campaign. A quick look in our spam folder will probably show dozens, all filtered out by our email service provider. They are relatively easy to recognize, often including typos, grammatical errors and have a general unprofessional appearance. According to the 2020 Data Breach Investigations Report, click rates on phishing emails are at an all-time low at just 3.4%.
This makes spray and pray a numbers game. Any given phishing message has a 96.6% chance of being ignored by its victim, even if it makes it through the email services automated filters. However, this means that for every hundred messages successfully sent in a spray-and-pray campaign, we can expect three or four people to fall victim to it. If a campaign manages to distribute 100,000 fraudulent messages, this gives the hackers 3,400 compromised victims.
Spear phishing is more sophisticated, often more technical and is potentially more damaging than spray-and-pray phishing. Spear-phishers will research their target or targets using different forms of OSINT (open source intelligence, such as social media), gathering information on the targets habits, which services they use, their contacts and more. With this information built into the email, the message can appear to come from a trusted source, and will often be convincing and compelling.
It is worth mentioning that since spray and pray phishing is easy to detect, many people believe they cannot be tricked by any phishing. This is dangerous. There is probably no one in the world who could not be spear-phished. Consider the case of the Telegraph journalist who effectively challenged a white hat hacker to break into her computer. He did just that by spear-phishing her with the opportunity for a compelling news story combined with a sense of urgency.
Victims succumb to phishing attacks because of the combination of the structure of the email and the lure it contains, and the inclusion of various emotional triggers that elicit the response required by the attacker. Well discuss these next as the anatomy of a phish and the emotional triggers. If we understand how we are phished, we will be better equipped to recognize and ignore (or report) a phishing attack when it happens.
Anatomy of a phish
Well focus on email phishing, as this is both the most common vector for phishing attacks and allows us to analyze the complete anatomy of phishing messages.
The visible email header is that part of the email we can see before we open it. It is the attackers first opportunity to catch our attention, but is also the point at which many spray and pray campaigns immediately fail. The intent is to appear to be an interesting subject from a trusted source. A spray and pray example from my own spam folder is from _ nooreply[@]l1i.affpartners.com. High Priority is not a person, but is intended to add a sense of urgency to the email (see emotional triggers below), encouraging potential victims to open it before stopping to think. A moments closer inspection lets us see more holes: l1i.affpartners.com doesnt look like a legitimate domain, and nooreply is probably a typo for the more usual no.reply or no-reply.
Spear-phishing attacks can be more subtle. If you have a friend or colleague with the email address John.Smith[@]company.com, attackers may message you as John.Smith[@]google.com, using an open email service and hoping you dont notice the different domain.
The subject line of the header is key to a good phish it is the primary factor in what makes us decide whether to read the email or not. It must be short enough to be easily processed by the target, but needs to contain strong emotional triggers to make itself hard to ignore. Effective phishing subjects will leverage either a sense of threat, urgency, or the prospect of gain for the user. According to research by KnowBe4, the most clicked phishing subject is Change of Password Required Immediately, with similar lines accounting for another three of the top 10 most clicked phishing subjects. International disasters also offer compelling subjects, with curiosity, fear and compassion being typical emotional triggers and the COVID-19 pandemic is a clear illustration.
With all forms of email scam, the body, or content, contains the lure. Loosely, the lure can be seen as the bait that is used to tempt the phished to take the hook (the payload, see below).
By this stage, the attacker has successfully convinced the target to open and read the email. Now the lure in the email body must convince the victim to click a link or respond. The lure is typically full of emotional triggers designed to engage the victim favorably. Consider this example of a spray-and-pray lure:
Leaving aside that I never do online surveys, the grammatical and spelling errors as well as odd syntax typical of spray and pray attacks make it obvious that this is a phish. The two most obvious emotional triggers are greed (who wouldnt want a free iPhone?), and urgency (the target is given just 24 hours, or this opportunity will be taken away). Other common phishing lures range from commonplace and plausible (but fraudulent) invoices and delivery notifications to more grandiose legal threats, or simply masquerading as charitable or governmental organizations.
The payload is the crux of the phishing email. The most common payload is a malicious link; this can lead to a malicious or compromised website where a falsified login screen harvests credentials and sends them to the attacker. The link can be in the body of the email or found in an attachment.
Any payload link is usually disguised. In the above example, the click here button is the payload. If you hover the mouse cursor above a link, most browsers will display the URL in the bottom left of the screen, allowing you to see the actual destination. To counter this, many phishers are using URL shorteners like Bitly to hide the real destination our example shows as https:// t.co/YwTb24fxMI ?amp=1. URL obfuscation is always suspicious, so any email containing a shortened or obfuscated URL should probably be treated as phishing until proven otherwise.
Emotional triggers
The header, the subject, the lure and the payload form the fundamental structure of a phish, but success or failure rests on the emotional triggers contained within the message. Emotional triggers are there to prompt an immediate, unthinking, knee-jerk reaction, because the more we can think, analyze and consider a phishing message, the less likely it is to succeed. Consequently, it is important to give ourselves time. Even if an email appears both urgent and legitimate, setting a rule to never respond to any email without a small thinking period can go a long way to helping us keep a cool head and seeing through the emotional manipulation.
The main emotional triggers are listed below, but it is important to remember that any combination of them can be included in a phishing email, and the more sophisticated attacks will make use of them in very subtle ways.
Greed may be the earliest emotional trigger that phishing scams have tried to exploit. The greed trigger goes even further back than the infamous Nigerian Prince scams, but there are still many attempts to capitalize on greed to this day. In late 2019, Microsoft employees were targeted with a phishing campaign purporting to disclose upcoming salary increases. The payload was a link to a fraudulent login screen designed to harvest Microsoft Office login credentials. Two axioms are always important to bear in mind when opening any email: nothing in life is free; and if something seems too good to be true, it probably is.
Urgency is commonly present in phishing. Rather than being an effective emotional trigger by itself, urgency must work in conjunction with other emotional triggers: You have a free gift but must claim it within 24 hours. We have embarrassing information to share with all your contacts if you dont respond by midnight. If the scammer can remove the victims thinking time or push them into a panic state, it drastically increases the chance of successfully tricking the target.
Good mental defenses against urgency are difficult to cultivate because urgency is specifically designed to disrupt those mental defenses. However, it is useful to remember that if you receive an email or a message that fills you with dread, its likely that whoever sent it wants you to panic. Counterintuitively, taking feelings of urgency as a sign that its time to stop and think carefully can help foil most of even the most effective phishing campaigns.
Fear can apply in a lot of different situations and contexts. There is often a strong interplay with urgency, especially when it comes to fear of bad consequences if we dont respond immediately. Fear plus urgency often equals panic, and can be used in legal threats or threats to release intimate personal information.
Fear can also be less visceral fear of missing an opportunity and fear of being uninformed can be equally compelling emotional triggers. Phishing scams often prey on both fear of danger, and fear of missing out (FOMO).
The COVID-19 pandemic has given rise to a spate of phishing scams that target both of these aspects of fear; the deadly and contagious infection has many of us fearing for our safety, and there is a strong desire for us all to stay informed and up to date on all the latest developments (or obtain one of a very limited supply of (non-existent) vaccines).
While most emotional triggers exploit our base instincts, our better nature can also be used against us. Any crisis, emergency or disaster tends to cause a spike in phishing emails attempting to capitalize on it. Phishing emails can impersonate a charitable organization or a person in need. The spate of tropical storms over 2018 and 2019 prompted a variety of organizations (including the FCC) to issue official warnings about post-disaster scams, urging users to verify any charitys credentials carefully. These so-called charities arent after your donation, theyre after your bank details.
Curiosity can be a particularly dangerous trigger, as we often dont consider that just having a look can put us in danger. The same principles that apply to clickbait articles online can be used in phishing; any sufficiently sensationalist subject line could be irresistible to our curiosity: you just wont believe entry number 7! In the wake of Kobe Bryants death earlier this year, clickbait phishing with subjects like amazing, shocking, or never before seen! became so widespread that it prompted the Better Business Bureau to issue an official warning to consumers.
Technological defenses against phishing
Businesses and cybersecurity organizations are always looking for ways to prevent phishing with technology. As much as these technological solutions may help to mitigate phishing and reduce the exposure of users to phishing scams, the continuing prevalence of phishing and the damage it causes mean we have to consider them a failure so far. According to the 2020 DBIR, 22% of all breaches over the past year have involved phishing, while around 80% of all social type attacks are phishing messages of some kind.
Browser developers maintain blacklists of known phishing websites which can help prevent users visiting malicious URLs. This is only partially effective, since the average phishing campaign lasts for just 12 minutes the malicious website changes before it can be added to the blacklist.
Artificial intelligence is also used to scan emails to detect phishing. This can be effective with spray-and-pray phishing, but AI products entail high expenses, and tend to be useful only to companies rather than consumers.
DMARC short for Domain-based Message Authentication, Reporting & Conformance is a technology that unequivocally works against phishing, some of the time. We wont go into the details of the technology (DMARC is built on the top of other technologies, notably SPF and DKIM, that were also designed to counteract phishing), but just explain why it works when it works, and why it doesnt ultimately help the end-user.
DMARC works against what is known as exact domain phishing. This is where the phishing email appears to come from the exact, expected, and correct domain (as shown in the From line of the header). If DMARC is fully installed by a service provider, the technology confirms that the message has genuinely come from that domain. If not, it assumes phishing and blocks it.
To demonstrate how well this works, consider the UKs tax authority, HMRC. In 2016, this domain was the 16th most phished domain in the world. HMRC then installed DMARC, and has since dropped to number 126 in the world. During this period, DMARC stopped 300 million attempted phishing emails.
However, DMARC can do nothing to stop non-exact domain phishing. This is where the from domain in the email header is a look-alike rather than the genuine exact domain. So, for example, I could register the domain hnnrc[.]co.uk (or hnnrc[.]uk or hnnrc[.]org.uk or hnnrc[.]me.uk all of which were available at the time of writing in the genuine expectation that a percentage of recipients would not notice that hnnrc is not hmrc.
The second weakness in DMARC is that only a tiny percentage of firms have implemented it. But the real weakness is that the end-user has no way of knowing whether a received email has been DMARC-checked or not. Consequently, all received emails need to be considered suspect, whether or not DMARC is involved.
There is an attempt to solve the last problem with the introduction of yet another technology: BIMI, or Brand Indicators for Message Identification. BIMI only works where DMARC has been fully and correctly implemented. If the email service provider knows through DMARC that the email is genuine, and if the sending domain has implemented BIMI, the email service will insert the domains logo into the email list. So, if you check your email list and see the expected sender logo, then you can be confident the email is genuine and not a phishing email.
But again, only a tiny percentage of organizations have fully implemented DMARC, and only a tiny percentage of those have implemented BIMI. It is not likely to happen, but exact domain phishing could be eliminated if DMARC and BIMI were required email standards. In the meantime, from the end-users perspective, DMARC does nothing to solve the phishing problem even though it works.
Summary
We are much more likely to be fooled by phishing than we think. For example, in a survey conducted by PhishMe last year, only 10.4% of respondents believed that fear was an effective motivating factor in opening an email. However, a simulated phishing email threatening the recipient with a legal complaint was opened by 44% of participants. Just 7.8% believed they would be taken in by the prospect of an opportunity, but a spoof phish purporting that the targets were eligible for medical insurance was clicked by 39.2% of participants.
It is often said that the weakest link in security is the user, but with enough awareness and understanding, this doesnt need to be the case. Technology does not yet have a reliable solution to phishing, and these attacks cannot be dealt with by anti-malware or general cybersecurity due to their psychological nature. If we can recognize phishing attacks by understanding the anatomy of a phish, stay calm and vigilant, and not allow our emotional buttons to be pushed, users can become the strongest link in security.
More here:
The Anatomy Of A Phish | Avast - Security Boulevard
- Isaiah Washington Says Sandra Oh Brought Him Back on Greys Anatomy Years After Firing - E! Online - April 27th, 2025 [April 27th, 2025]
- Hailey Bieber Is Outed as an Obsessive 'Greys Anatomy' Fan: It's 'a Big Secret' - People.com - April 27th, 2025 [April 27th, 2025]
- Unfurling Anatomy explores neuroplasticity and healing through artistic expression - 13wham.com - April 27th, 2025 [April 27th, 2025]
- Why isnt Greys Anatomy on TV tonight? When is the next new episode? - PennLive.com - April 27th, 2025 [April 27th, 2025]
- Why Greys Anatomy Isnt Airing a New Episode Tonight (April 24) & When Itll Return - Just Jared - April 27th, 2025 [April 27th, 2025]
- Greys Anatomy season 21 new episode tonight - How to watch on ABC for free - MassLive - April 27th, 2025 [April 27th, 2025]
- Anatomy of a US Treasury Sell-Off - AllianceBernstein - Commentaries - Advisor Perspectives - April 27th, 2025 [April 27th, 2025]
- Anatomy Of Lies Documentary: Everything To Know About The Grey's Anatomy Writer Who Faked Cancer (& Where To Watch Online) - Screen Rant - April 27th, 2025 [April 27th, 2025]
- 'Greys Anatomy' Star Katherine Heigl Slammed With Lawsuit For Alleged $300,000 Unpaid Services - Yahoo - April 27th, 2025 [April 27th, 2025]
- Grey's Anatomy's Isaiah Washington Says Sandra Oh Brought Him Back After Altercation with Patrick Dempsey - E! Online - April 27th, 2025 [April 27th, 2025]
- Why Arent 9-1-1, Doctor Odyssey & Greys Anatomy New Tonight? - The Sanford Herald - April 27th, 2025 [April 27th, 2025]
- 'Grey's Anatomy' Teases a Winston/Jules Pairing: Are You Feeling It? - TVLine - April 27th, 2025 [April 27th, 2025]
- Anatomy of a PMs fall: did Albanese stumble off a stage - and why are we still talking about it? - The Guardian - April 27th, 2025 [April 27th, 2025]
- Anatomy Of A Bitcoin Bear Market: Expert Trader Reveals The Signals To Watch Out For | Bitcoinist.com - Bitcoinist.com - April 19th, 2025 [April 19th, 2025]
- 'Grey's Anatomy' Recap: Are Winston Ndugu and Jules Millin the Next Power Couple at Grey-Sloan? - TV Insider - April 19th, 2025 [April 19th, 2025]
- Greys Anatomy Taps Piper Perabo for Three-Episode Arc Whats Her Connection to Amelia? - TVLine - April 19th, 2025 [April 19th, 2025]
- The anatomy of an NPR headline - VPM - April 19th, 2025 [April 19th, 2025]
- Anatomy of the system: Criminal case is finally (almost) over - nrtoday.com - April 19th, 2025 [April 19th, 2025]
- Grey's Anatomy Season 21, Episode 15 Review: Im Glad The Characters Are Showing Off Their Silly Sides In The Shows Funniest Episode In A Long Time -... - April 19th, 2025 [April 19th, 2025]
- Jessie Buckley to Narrate Leah Hazards Novel The Anatomy of Us for Audible (EXCLUSIVE) - Variety - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeo reveals why shell never leave Greys Anatomy for good: It doesnt make any sense - New York Post - April 19th, 2025 [April 19th, 2025]
- Greys Anatomy season 21 episode 15: Where to watch free tonight - MassLive - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeo says leaving 'Grey's Anatomy' would mean that others get to 'profit' off her hard work - Business Insider - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeo on Why It Would Make No Sense to Walk Away From Greys Anatomy - Rolling Stone - April 19th, 2025 [April 19th, 2025]
- In the Human Anatomy Lab, Experiential Learning Prepares Future Health Care Leaders - U of G News - April 19th, 2025 [April 19th, 2025]
- Window washers platform crashes into hospital: How to watch Greys Anatomy without cable - PennLive.com - April 19th, 2025 [April 19th, 2025]
- Riley Greene, Colt Keith and the anatomy of a slump - The Athletic - The New York Times - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeo reveals she gets a little bit annoyed when Greys Anatomy fans call her Meredith - The Independent - April 19th, 2025 [April 19th, 2025]
- Revisiting the 20-Year History of the Music of Greys Anatomy - Shondaland - April 19th, 2025 [April 19th, 2025]
- Yellowstone Star Piper Perabo Joins the Cast of Greys Anatomy in Recurring Role - EntertainmentNow - April 19th, 2025 [April 19th, 2025]
- Seriously? Greys Anatomy Is Making Us Take Sides, and It Feels Like [Bleep] - TVLine - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeos honest reason for never leaving Greys Anatomy branded weird - The Independent - April 19th, 2025 [April 19th, 2025]
- The body as a manifesto: Schiaparellis use of anatomy - HIGHXTAR. - April 19th, 2025 [April 19th, 2025]
- Ellen Pompeo reveals one frustration with Grey's Anatomy fans: "I do get a little bit annoyed" - Digital Spy - April 19th, 2025 [April 19th, 2025]
- On Set: Greys Anatomy Stars Sharing Their Hidden Talents - Shondaland - April 19th, 2025 [April 19th, 2025]
- Anatomy of a Shot | The Gorge: Building the Blast - DNEG - April 19th, 2025 [April 19th, 2025]
- The countries with longest anatomy measurements (7+ inches) and what this means for your health - Journe Mondiale - April 10th, 2025 [April 10th, 2025]
- 21 "Grey's Anatomy" Behind-The-Scenes Facts That'll Make You Watch The Show In A Whole New Way - BuzzFeed - April 10th, 2025 [April 10th, 2025]
- Anatomy of Exile by Zeeva Bukai reflects on the elusive nature of home - jweekly.com - April 10th, 2025 [April 10th, 2025]
- Sex toys and exploding cosmetics: Anatomy of a 'hybrid war' on the West - Reuters - April 10th, 2025 [April 10th, 2025]
- Doctor Odyssey Has Higher Ratings Than Grey's Anatomy, So Why Was It At The Risk Of Being Canceled When Shonda Rhimes' Show Was Already Renewed -... - April 10th, 2025 [April 10th, 2025]
- Anatomy of a housing proposal toppled by NIMBYs - The Portland Press Herald - April 10th, 2025 [April 10th, 2025]
- The Anatomy of a New Distribution Branch - Roofing Contractor - April 10th, 2025 [April 10th, 2025]
- 'Grey's Anatomy' Is Returning for Season 22: Get the Scoop - TV Insider - April 10th, 2025 [April 10th, 2025]
- Greys Anatomy: Has Owen Broken the Open Relationship Rules Already? - TV Insider - April 10th, 2025 [April 10th, 2025]
- Greys Anatomy Season 21, Episode 13 Review: Im More Excited Than Ever For The Last 5 Episodes Thanks To A Few Storyline Advancements - Screen Rant - April 10th, 2025 [April 10th, 2025]
- 'Grey's Anatomy': Teddy Makes a Tearful Admission as She and Owen Navigate Their Open Marriage - People.com - April 10th, 2025 [April 10th, 2025]
- Greys Anatomy, Shifting Gears Among Five ABC Renewals, Doctor Odyssey in Limbo - hollywoodreporter.com - April 10th, 2025 [April 10th, 2025]
- Effect of Virtual Reality Simulation on Anatomy Learning Outcomes: A Systematic Review - Cureus - April 10th, 2025 [April 10th, 2025]
- Greys Anatomy Renewed For Season 22 By ABC With Veteran Cast Poised To Return - Deadline - April 10th, 2025 [April 10th, 2025]
- Grey's Anatomy: Kim Raver Talks Teddy and Owen's Open Marriage - Us Weekly - April 10th, 2025 [April 10th, 2025]
- Greys Anatomy: Sophia Bush Discusses Cass And Teddys Long-Awaited Tryst & Whether Theres More To Come Between Them - Deadline - April 10th, 2025 [April 10th, 2025]
- 9-1-1, Greys Anatomy, The Rookie, Shifting Gears, Will Trent Renewed at ABC - Variety - April 10th, 2025 [April 10th, 2025]
- 7 Times the Greys Anatomy Surgeons Did the Impossible - Shondaland - April 10th, 2025 [April 10th, 2025]
- Grey's Anatomy Is Bound To Repeat A Controversial George Plot From 18 Years Ago (But With A Twist) - Screen Rant - April 10th, 2025 [April 10th, 2025]
- Ellen Pompeo Reveals The Exact Moment Her Daughter Stopped Watching 'Grey's Anatomy' - HuffPost - April 10th, 2025 [April 10th, 2025]
- Anatomy Of A Market Crisis: Tariffs, Markets And The Economy - Seeking Alpha - April 10th, 2025 [April 10th, 2025]
- Pulse Bosses on Danny and Xanders Messy Power Dynamic, Greys Anatomy Comparisons and Season 2 Plans - Variety - April 10th, 2025 [April 10th, 2025]
- Bare Anatomy parent Innovist raises Rs 136 crore from ICICI Venture, others - The Economic Times - April 10th, 2025 [April 10th, 2025]
- T.R. Knight Was 'Scared' to Film Meredith and George's 'Humiliating' Grey's Anatomy Sex Scene (Exclusive) - People.com - April 10th, 2025 [April 10th, 2025]
- "Thats My Home": Ellen Pompeo Reveals Whether She Has Plans To Exit 'Grey's Anatomy' for Good - Collider - April 10th, 2025 [April 10th, 2025]
- TVs Current Medical Dramas, Ranked: Our Diagnoses for The Pitt, Watson, Doc Greys Anatomy and More - TVLine - April 10th, 2025 [April 10th, 2025]
- Anatomy of a Market Crisis: Tariffs, Markets and the Economy - Investing.com - April 10th, 2025 [April 10th, 2025]
- Who Will Save Greys Anatomy Now That Ellen Pompeo Is Gone? - The Daily Beast - April 10th, 2025 [April 10th, 2025]
- 19 Most Memorable (and Heart-Wrenching!) 'Grey's Anatomy' Episodes of All Time - PEOPLE - March 30th, 2025 [March 30th, 2025]
- 16 stars you forgot were on Grey's Anatomy before their big break (including future Oscar nominees) - Entertainment Weekly News - March 30th, 2025 [March 30th, 2025]
- "I Cried When He Died": Shonda Rhimes Is Still Deeply Impacted By Killing One Grey's Anatomy Character - Screen Rant - March 30th, 2025 [March 30th, 2025]
- See the Best Greys Anatomy Behind-the-Scenes Photos to Celebrate 20 Years of the Medical Drama - PEOPLE - March 30th, 2025 [March 30th, 2025]
- Katherine Heigl, Jeffrey Dean Morgan reunite to talk Grey's Anatomy , from Denny's death to ghost sex - Entertainment Weekly News - March 30th, 2025 [March 30th, 2025]
- Sandra Oh Is Changing Her Tune on a Potential Return to 'Grey's Anatomy' - PEOPLE - March 30th, 2025 [March 30th, 2025]
- The Scrapped Grey's Anatomy Spin-Off Would Have Ruined The Show's Best Characters - SlashFilm - March 30th, 2025 [March 30th, 2025]
- Anatomy of a flood: The Derna tragedys lessons for Libyan governance - Brookings Institution - March 30th, 2025 [March 30th, 2025]
- 19 Years Later, Shonda Rhimes Still Isnt Over This Greys Anatomy Death (and Neither Are We) - Collider - March 30th, 2025 [March 30th, 2025]
- The perfect palliative balm of Greys Anatomy - Financial Times - March 30th, 2025 [March 30th, 2025]
- 15 Behind-the-Scenes Facts You Didn't Know About Grey's Anatomy, 20 Years After It Premiered - MSN - March 30th, 2025 [March 30th, 2025]
- I Have Zero Endings: Shonda Rhimes Has No Idea How (or When) Greys Anatomy Will End - Collider - March 30th, 2025 [March 30th, 2025]
- My Only Allegiance Is to the Story: Shonda Rhimes Explains Why Shes Killed So Many Beloved Greys Anatomy Characters - Collider - March 30th, 2025 [March 30th, 2025]
- 'Grey's Anatomy' star Ellen Pompeo says $20 million salary brings 'true independence': 'I don't have to do anything I don't want to do' - CNBC - March 30th, 2025 [March 30th, 2025]
- 'I love your song from "Grey's Anatomy"': How the ABC medical drama's soundtrack changed these artists' musical careers - Yahoo... - March 30th, 2025 [March 30th, 2025]
- Shonda Rhimes On The 'Grey's Anatomy' & 'Scandal' Spinoffs That Never Materialized: "We Thought About A Lot Of Things" - Deadline - March 30th, 2025 [March 30th, 2025]