%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250710010251+00'00') /ModDate (D:20250710010251+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 5744 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 71.651 521.469 675.083 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 71.651 l 565.984 71.651 l 565.984 745.984 l f 45.266 746.734 m 45.266 71.651 l 46.016 71.651 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WHATSAPP SCAMS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(cyber criminals with another way to convince you to part with your well-earned money and unfortunately it's usually quite )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(convincing.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(don't fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(something, it doesn’t mean that it is safe.)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(Voucher scams)] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they've found. The )] TJ ET BT 61.016 522.508 Td /F4 9.0 Tf [(messages usually come with a link that actually takes you to another website and tricks you into giving your personal )] TJ ET BT 61.016 511.519 Td /F4 9.0 Tf [(information. Don’t ever click a link you're not sure of and certainly don't ever hand over personal information to a website )] TJ ET BT 61.016 500.530 Td /F4 9.0 Tf [(you haven't checked.)] TJ ET BT 61.016 480.541 Td /F1 9.0 Tf [(WhatsApp shutting down)] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. )] TJ ET BT 61.016 449.563 Td /F4 9.0 Tf [(The messages often look convincing, claiming to come from the CEO or another official. They're written using the right )] TJ ET BT 61.016 438.574 Td /F4 9.0 Tf [(words and phrases and look like an official statement. Any official statement wouldn't need users to send it to everyone )] TJ ET BT 61.016 427.585 Td /F4 9.0 Tf [(like a round robin. You would either see it in the news or it'll come up as a proper notification in the app from the actual )] TJ ET BT 61.016 416.596 Td /F4 9.0 Tf [(WhatsApp team.)] TJ ET BT 61.016 396.607 Td /F1 9.0 Tf [(WhatsApp threatening to shut down your account)] TJ ET BT 61.016 376.618 Td /F4 9.0 Tf [(This is very similar to the previous scam. It looks like an official message that claims that people's WhatsApp accounts are )] TJ ET BT 61.016 365.629 Td /F4 9.0 Tf [(being shut down for being inactive. Sending the message on will prove that it's actually being used and often instructs )] TJ ET BT 61.016 354.640 Td /F4 9.0 Tf [(people to pass it along.)] TJ ET BT 61.016 334.651 Td /F1 9.0 Tf [(WhatsApp forcing you to pay)] TJ ET BT 61.016 314.662 Td /F4 9.0 Tf [(Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay )] TJ ET BT 61.016 303.673 Td /F4 9.0 Tf [(for your account – if you send it on to other people.)] TJ ET BT 61.016 283.684 Td /F1 9.0 Tf [(WhatsApp Gold or WhatsApp Premium)] TJ ET BT 61.016 263.695 Td /F4 9.0 Tf [(The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It )] TJ ET BT 61.016 252.706 Td /F4 9.0 Tf [(offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security )] TJ ET BT 61.016 241.717 Td /F4 9.0 Tf [(features. The problem is that it is far from secure. Downloading the app infects people's phones with malware that use the )] TJ ET BT 61.016 230.728 Td /F4 9.0 Tf [(phone to send more fake messages at the cost of the original victim.)] TJ ET BT 61.016 210.739 Td /F1 9.0 Tf [(Emails from WhatsApp)] TJ ET BT 61.016 190.750 Td /F4 9.0 Tf [(Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There's a range of scams out there that send )] TJ ET BT 61.016 179.761 Td /F4 9.0 Tf [(people e-mails that look like they've come from WhatsApp, usually looking like a notification for a missed voice call or )] TJ ET BT 61.016 168.772 Td /F4 9.0 Tf [(voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. )] TJ ET BT 61.016 157.783 Td /F4 9.0 Tf [(Don't ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about )] TJ ET BT 61.016 146.794 Td /F4 9.0 Tf [(missed calls or voicemails.)] TJ ET BT 61.016 126.805 Td /F1 9.0 Tf [(Fake WhatsApp spying apps)] TJ ET BT 61.016 106.816 Td /F4 9.0 Tf [(Currently, it is not possible to let people spy on other's conversations on WhatsApp, because it has end-to-end encryption )] TJ ET BT 61.016 95.827 Td /F4 9.0 Tf [(enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps )] TJ ET BT 61.016 84.838 Td /F4 9.0 Tf [(encourage people to download something that isn't actually real and force people to pay money for malware, or actually )] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Annots [ 14 0 R ] /Contents 13 0 R >> endobj 13 0 obj << /Length 1794 >> stream 0.153 0.153 0.153 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 527.866 521.469 230.118 re f 0.773 0.773 0.773 rg 45.266 527.866 m 566.734 527.866 l 565.984 528.616 l 46.016 528.616 l f 566.734 757.984 m 566.734 527.866 l 565.984 528.616 l 565.984 757.984 l f 45.266 757.984 m 45.266 527.866 l 46.016 528.616 l 46.016 757.984 l f 61.016 543.616 m 550.984 543.616 l 550.984 544.366 l 61.016 544.366 l f 0.153 0.153 0.153 rg BT 61.016 749.193 Td /F4 9.0 Tf [(read your chats once they've got onto your phone.)] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(Lastly - )] TJ ET BT 61.016 709.215 Td /F4 9.0 Tf [(Hopefully, you have  already blocked sharing your WhatsApp details with Facebook \(telephone number, name etc. and )] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(allowing Facebook to suggest phone contacts as friends\) and Facebook will not be able to  make your WhatsApp account )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(accessible to the 13 million South African Facebook users.)] TJ ET BT 61.016 667.248 Td /F4 9.0 Tf [(There are some details about this controversial policy change by WhatsApp on the following page: )] TJ ET 0.373 0.169 0.255 rg BT 61.016 656.259 Td /F4 9.0 Tf [(http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 655.108 m 339.116 655.108 l S 0.153 0.153 0.153 rg BT 61.016 636.270 Td /F4 9.0 Tf [( )] TJ ET BT 432.949 616.281 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET BT 548.482 596.292 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 576.303 Td /F4 9.0 Tf [( )] TJ ET 0.400 0.400 0.400 rg BT 61.016 557.814 Td /F2 9.0 Tf [(Posted in:Apps,Communication | Tagged:Malware,Phishing,Security,Spam,Whatsapp | With 0 comments)] TJ ET endstream endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 655.4266 339.1157 664.5841 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000542 00000 n 0000006338 00000 n 0000006450 00000 n 0000006565 00000 n 0000006685 00000 n 0000006793 00000 n 0000006877 00000 n 0000008724 00000 n 0000008851 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 8969 %%EOF malware « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

malware

How do I report phishing?

Tuesday, October 5th, 2021

You’ve received a suspicious email, what should you do with it? Firstly, don’t click on any links. But just as important, send it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team (CSIRT) can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.

What is phishing?

Phishing attacks are designed to steal a person’s login and password details so that the cyber criminal can assume control of the victim’s social network, email, and online bank accounts. Seventy percent of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. 

More on how to recognise a phishing email. 

Report phishing

On the ICT Partner Portal:

*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be forwarded. This ensures the original email can be analysed with its full Internet message headers intact. Alternatively, use the mail application to save the email (usually located under File | Save As) as an .EML or .MSG format to a folder location, and attach the saved file to a new email.

Malware warning

Tuesday, April 16th, 2019

Emails with the subjects “Have you received your payment” and “Apply for a loan” are being distributed to students and staff. Please do not open these since they could contain an embedded file which will infect your device with malware.

When you receive emails with attachments from unknown senders, keep in mind that you should never open attachments as they could contain malicious content.

If you think your account or device has been compromised or you notice suspicious activity:

  1. Immediately change your password on www.sun.ac.za/password.
  2. Contact the IT Service Desk by logging a request or calling 808 4367.
  3. More information is available on our blog and Twitter.

Learn What It Takes to Refuse the Phishing Bait!

Wednesday, February 1st, 2017

Cybercriminals know the best strategies for gaining access to your institution’s sensitive data. In most cases, it doesn’t involve them rappelling from a ceiling’s skylight and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate one staff member or student.

According to IBM’s 2014 Cyber Security Intelligence Index, human error is a factor in 95 percent of security incidents. Following are a few ways to identify various types of social engineering attacks and their telltale signs.

  • Phishing isn’t relegated to just e-mail! Cyber criminals will also launch phishing attacks through phone calls, text messages, or other online messaging applications. Don’t know the sender or caller? Seem too good to be true? It’s probably a phishing attack.
  • Know the signs. Does the e-mail contain a vague salutation, spelling or grammatical errors, an urgent request, and/or an offer that seems impossibly good? Click that delete button.
  • Verify the sender. Check the sender’s e-mail address to make sure it’s legitimate. If it appears that our help desk is asking you to click on a link to increase your mailbox quota, but the sender is “UniversityHelpDesk@yahoo.com,” it’s a phishing message.
  • Don’t be duped by aesthetics. Phishing e-mails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. However, if the message is urging you to take action — especially action such as sending sensitive information, clicking on a link, or downloading an attachment — exercise caution and look for other telltale signs of phishing attacks. Don’t hesitate to contact the company directly; they can verify legitimacy and may not even be aware that their name is being used for fraud.
  • Never, ever share your password. Did we say never? Yup, we mean never.Your password is the key to your identity, your data, and your classmates’ and colleagues’ data. It is for your eyes only. The IT department will never ask you for your password.
  • Avoid opening links and attachments from unknown senders. Get into the habit of typing known URLs into your browser. Don’t open attachments unless you’re expecting a file from someone. Give them a call if you’re suspicious.
  • When you’re not sure, call to verify. Let’s say you receive an e-mail claiming to be from someone you know — a friend, colleague, or even the rector of the university. Cyber criminals often spoof addresses to convince you, then request that you perform an action such as transfer funds or provide sensitive information. If something seems off about the e-mail, call them at a known number listed in the university’s directory to confirm the request.
  • Don’t talk to strangers! Receive a call from someone you don’t know? Are they asking you to provide information or making odd requests? Hang up the phone and report it to the helpdesk.
  • Don’t be tempted by abandoned flash drives. Cyber criminals may leave flash drives lying around for victims to pick up and insert, thereby unknowingly installing malware on their computers. You might be tempted to insert a flash drive only to find out the rightful owner, but be wary — it could be a trap.
  • See someone suspicious? Say something. If you notice someone suspicious walking around or “tailgating” someone else, especially in an off-limits area, call campus safety.

[ARTICLE FROM Educause]

Whatsapp scams

Wednesday, November 23rd, 2016

WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides cyber criminals with another way to convince you to part with your well-earned money and unfortunately it’s usually quite convincing.

WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and don’t fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you something, it doesn’t mean that it is safe.

Voucher scams

A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they’ve found. The messages usually come with a link that actually takes you to another website and tricks you into giving your personal information. Don’t ever click a link you’re not sure of and certainly don’t ever hand over personal information to a website you haven’t checked.

WhatsApp shutting down

There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. The messages often look convincing, claiming to come from the CEO or another official. They’re written using the right words and phrases and look like an official statement. Any official statement wouldn’t need users to send it to everyone like a round robin. You would either see it in the news or it’ll come up as a proper notification in the app from the actual WhatsApp team.

WhatsApp threatening to shut down your account

This is very similar to the previous scam. It looks like an official message that claims that people’s WhatsApp accounts are being shut down for being inactive. Sending the message on will prove that it’s actually being used and often instructs people to pass it along.

WhatsApp forcing you to pay

Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay for your account – if you send it on to other people.

WhatsApp Gold or WhatsApp Premium

The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security features. The problem is that it is far from secure. Downloading the app infects people’s phones with malware that use the phone to send more fake messages at the cost of the original victim.

Emails from WhatsApp

Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There’s a range of scams out there that send people e-mails that look like they’ve come from WhatsApp, usually looking like a notification for a missed voice call or voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. Don’t ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about missed calls or voicemails.

Fake WhatsApp spying apps

Currently, it is not possible to let people spy on other’s conversations on WhatsApp, because it has end-to-end encryption enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps encourage people to download something that isn’t actually real and force people to pay money for malware, or actually read your chats once they’ve got onto your phone.

Lastly – 

Hopefully, you have  already blocked sharing your WhatsApp details with Facebook (telephone number, name etc. and allowing Facebook to suggest phone contacts as friends) and Facebook will not be able to  make your WhatsApp account accessible to the 13 million South African Facebook users.

There are some details about this controversial policy change by WhatsApp on the following page: http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949

 

[ARTICLE BY DAVID WILES]

 

 

How to avoid spam

Thursday, March 17th, 2016

Spam is unsolicited and often profitable bulk email. Spammers can send millions of emails in a single campaign for very little money. If even one recipient out of 10,000 makes a purchase, the spammer can turn a profit. Unfortunately spam is more than a mere nuisance. It is also used to distribute malware. 

Here are a few tips to prevent your mailbox from being flooded with unwanted, dubious e-mails.

Never make a purchase from an unsolicited email.
By making a purchase, you are funding future spam. Spammers may add your email address to lists to sell to other spammers and you will receive even more junk email. Worse still, you could be the victim of a fraud.

If you do not know the sender of an unsolicited email, delete it.
Spam can contain malware that damages or compromises the computer when the email is opened.

Don’t use the preview mode in your email viewer.
Spammers can track when a message is viewed, even if you don’t click on it. The preview setting effectively opens the email and lets spammers know that you receive their messages. When you check your email, try to decide whether a message is spam on the basis of the subject line only.

Don’t overexpose your email address.
How much online exposure you give your email address is the biggest factor in how much spam you receive. Here are some bad habits that expose your email address to spammers:
– Posting to mailing lists that are archived online
– Submitting your address to online services with questionable privacy practices
– Exposing your address publicly on social networks (Facebook, LinkedIn, etc.)
– Using an easily guessable address based on first name, last name and company
– Not keeping your work and personal email separate

Use the bcc field if you email many people at once.
The bcc or blind carbon copy field hides the list of recipients from other users. If you put the addresses in the To field, spammers may harvest them and add them to mailing lists.

Use one or two secondary email addresses.
If you fill out web registration forms or surveys on sites from which you don’t want further information, use a secondary email address. 

Opt out of further information or offers.
When you fill out forms on websites, look for the checkbox that lets you choose whether to accept further information or offers. Uncheck if you don’t want to receive any more correspondence.

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.