Analysis of a phishing email