%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 20 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517164610+00'00') /ModDate (D:20240517164610+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6222 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 80.165 521.469 666.569 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 80.165 l 565.984 80.165 l 565.984 745.984 l f 45.266 746.734 m 45.266 80.165 l 46.016 80.165 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(OUTWIT PHISHING ATTEMPTS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Over the past two weeks we've already recorded at least three incidents where phishing e-mails were sent to SU staff. )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(Although we try to warn users against specific e-mails and block these e-mails on server level as soon as we're aware of )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(them, it's almost impossible to protect e-mail users against each and every fraudulent e-mail.)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(The responsibility lies with the e-mail user in recognising the tell-tale signs and establishing whether it's a phishing e-mail )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(or not. Unfortunately 99% of the time it is and if you're ever in doubt over clicking on a link, rather don't. Go directly to the )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(institution's website and log in from there or contact the company or bank to confirm whether they sent it.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(The latest example of such an e-mail is an e-mail which seems to be from Discovery and \(of course\) promises a reward. )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(This is also a way to entice you into clicking on the links. Also look out for bad spelling, grammar and formatting. The links )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(may look convincing, but when you move the mouse over them, are they really Discovery's website links? By merely )] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(noticing this, you can immediately confirm that this is indeed an attempt at phishing. More hints on recognising fraudulent )] TJ ET BT 61.016 436.143 Td /F3 9.0 Tf [(e-mails can be found )] TJ ET 0.373 0.169 0.255 rg BT 147.056 436.143 Td /F3 9.0 Tf [(here.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 147.056 434.992 m 167.567 434.992 l S 0.400 0.400 0.400 rg BT 61.016 416.154 Td /F3 9.0 Tf [(Immediately delete the e-mail and don't click on the links or fill in any information. If you've supplied your info, immediately )] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(change your password and PIN and contact the institution to inform them of the breach. You can also send an e-mail to  )] TJ ET 0.373 0.169 0.255 rg BT 61.016 394.176 Td /F3 9.0 Tf [(sysadm@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 393.025 m 139.676 393.025 l S 0.400 0.400 0.400 rg BT 139.676 394.176 Td /F3 9.0 Tf [( with the subject SPAM and attach the suspect e-mail. IT system administrators will then be able to )] TJ ET BT 61.016 383.187 Td /F3 9.0 Tf [(block the e-mail and protect other staff against it.)] TJ ET BT 61.016 363.198 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 343.209 Td /F4 9.0 Tf [(EXAMPLE OF "PHISHING" E-MAIL:)] TJ ET 0.662 0.662 0.662 rg 0.662 0.662 0.662 RG 61.016 332.011 m 550.984 332.011 l 550.234 331.261 l 61.766 331.261 l f 0.172 0.172 0.172 rg 0.172 0.172 0.172 RG 61.016 100.154 m 550.984 100.154 l 550.234 100.904 l 61.766 100.904 l f 550.984 332.011 m 550.984 100.154 l 550.234 100.904 l 550.234 331.261 l f 0.662 0.662 0.662 rg 0.662 0.662 0.662 RG 61.016 332.011 m 61.016 100.154 l 61.766 100.904 l 61.766 331.261 l f 0.070 0.070 0.070 rg 0.070 0.070 0.070 RG 65.516 327.511 m 546.484 327.511 l 545.484 326.511 l 66.516 326.511 l f 0.560 0.560 0.560 rg 0.560 0.560 0.560 RG 65.516 104.654 m 546.484 104.654 l 545.484 105.654 l 66.516 105.654 l f 546.484 327.511 m 546.484 104.654 l 545.484 105.654 l 545.484 326.511 l f 0.070 0.070 0.070 rg 0.070 0.070 0.070 RG 65.516 327.511 m 65.516 104.654 l 66.516 105.654 l 66.516 326.511 l f 0.400 0.400 0.400 rg BT 70.266 313.970 Td /F3 9.0 Tf [(FROM: DiscoveryCard )] TJ ET BT 70.266 302.981 Td /F3 9.0 Tf [(SUBJECT: DiscoveryCard: 09 Feb:- Last chance to redeem your 7000 Discovery miles Point)] TJ ET BT 70.266 282.992 Td /F3 9.0 Tf [(--)] TJ ET BT 70.266 263.003 Td /F3 9.0 Tf [(Attention Valued Customer,)] TJ ET BT 70.266 243.014 Td /F3 9.0 Tf [(Your Discovery Card was credited with 7000 Miles \(R700\) as a reward for been a loyal customer last  2 weeks today \( )] TJ ET BT 70.266 232.025 Td /F3 9.0 Tf [(Final notice\) , but you did not claim it, we are giving you another chance. Follow the instructions below:-)] TJ ET BT 87.610 212.052 Td /F3 9.0 Tf [(1.)] TJ ET BT 100.266 212.036 Td /F3 9.0 Tf [(Click this link )] TJ ET 0.373 0.169 0.255 rg BT 154.770 212.036 Td /F3 9.0 Tf [(http://www.discovery.co.za/portal/individual/login )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 154.770 210.885 m 350.340 210.885 l S 0.400 0.400 0.400 rg BT 87.610 201.063 Td /F3 9.0 Tf [(2.)] TJ ET BT 100.266 201.047 Td /F3 9.0 Tf [(Then enter )] TJ ET 0.373 0.169 0.255 rg BT 146.292 201.047 Td /F3 9.0 Tf [(your www.discovery.co.za)] TJ ET 0.18 w 0 J [ ] 0 d 146.292 199.896 m 250.314 199.896 l S 0.400 0.400 0.400 rg BT 250.314 201.047 Td /F3 9.0 Tf [(Username and Password and click login)] TJ ET BT 87.610 190.074 Td /F3 9.0 Tf [(3.)] TJ ET BT 100.266 190.058 Td /F3 9.0 Tf [(Update your Discovery Credit Card  details and click update after you have completed it\( Note:-Do not fail to )] TJ ET BT 100.266 179.069 Td /F3 9.0 Tf [(enter the full details correctly, because the system will credit the R700 on the card details entered\).)] TJ ET BT 70.266 159.080 Td /F3 9.0 Tf [(Regards,)] TJ ET BT 70.266 139.091 Td /F3 9.0 Tf [(Discovery Miles Team)] TJ ET BT 70.266 119.102 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 91.363 Td /F3 9.0 Tf [( )] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 147.0557 435.3106 167.5667 444.4681 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://stbsp01.stb.sun.ac.za/innov/it/it-help/Wiki Pages/Phishing.aspx) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 393.3436 139.6757 402.5011 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (mailto:sysadm@sun.ac.za) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 154.7697 211.2036 350.3397 220.3611 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://notdiscoveryswebsite.com) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 146.2917 200.2146 250.3137 209.3721 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://notdiscoveryloginpage.com) >> endobj 20 0 obj << /Type /Page /Parent 3 0 R /Annots [ 22 0 R ] /Contents 21 0 R >> endobj 21 0 obj << /Length 994 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 663.778 521.469 94.206 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 663.778 m 566.734 663.778 l 565.984 664.528 l 46.016 664.528 l f 566.734 757.984 m 566.734 663.778 l 565.984 664.528 l 565.984 757.984 l f 45.266 757.984 m 45.266 663.778 l 46.016 664.528 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 740.193 Td /F3 9.0 Tf [(Stuur ‘n e-pos aan )] TJ ET 0.373 0.169 0.255 rg BT 137.057 740.193 Td /F3 9.0 Tf [(sysadm@sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 137.057 739.042 m 215.717 739.042 l S 0.400 0.400 0.400 rg BT 215.717 740.193 Td /F3 9.0 Tf [( met Subject: SPAM en heg dan die verdagte e-pos met Insert Item aan.)] TJ ET BT 61.016 720.204 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 700.215 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 681.726 Td /F3 9.0 Tf [(Posted in:E-mail,Security | | With 0 comments)] TJ ET endstream endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 137.0567 739.3606 215.7167 748.5181 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (mailto:sysadm@sun.ac.za) >> endobj xref 0 24 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000476 00000 n 0000000579 00000 n 0000006853 00000 n 0000006965 00000 n 0000007072 00000 n 0000007188 00000 n 0000007308 00000 n 0000007436 00000 n 0000007559 00000 n 0000007686 00000 n 0000007761 00000 n 0000007889 00000 n 0000007972 00000 n 0000008100 00000 n 0000008184 00000 n 0000008268 00000 n 0000009314 00000 n 0000009442 00000 n trailer << /Size 24 /Root 1 0 R /Info 5 0 R >> startxref 9517 %%EOF Outwit phishing attempts « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Outwit phishing attempts

Over the past two weeks we’ve already recorded at least three incidents where phishing e-mails were sent to SU staff. Although we try to warn users against specific e-mails and block these e-mails on server level as soon as we’re aware of them, it’s almost impossible to protect e-mail users against each and every fraudulent e-mail.

The responsibility lies with the e-mail user in recognising the tell-tale signs and establishing whether it’s a phishing e-mail or not. Unfortunately 99% of the time it is and if you’re ever in doubt over clicking on a link, rather don’t. Go directly to the institution’s website and log in from there or contact the company or bank to confirm whether they sent it.

The latest example of such an e-mail is an e-mail which seems to be from Discovery and (of course) promises a reward. This is also a way to entice you into clicking on the links. Also look out for bad spelling, grammar and formatting. The links may look convincing, but when you move the mouse over them, are they really Discovery’s website links? By merely noticing this, you can immediately confirm that this is indeed an attempt at phishing. More hints on recognising fraudulent e-mails can be found here.

Immediately delete the e-mail and don’t click on the links or fill in any information. If you’ve supplied your info, immediately change your password and PIN and contact the institution to inform them of the breach. You can also send an e-mail to  sysadm@sun.ac.za with the subject SPAM and attach the suspect e-mail. IT system administrators will then be able to block the e-mail and protect other staff against it.

 

EXAMPLE OF “PHISHING” E-MAIL:

FROM: DiscoveryCard <discoverycards@discovery.co.za>
SUBJECT: DiscoveryCard: 09 Feb:- Last chance to redeem your 7000 Discovery miles Point

Attention Valued Customer,

Your Discovery Card was credited with 7000 Miles (R700) as a reward for been a loyal customer last  2 weeks today ( Final notice) , but you did not claim it, we are giving you another chance. Follow the instructions below:-

  1. Click this link http://www.discovery.co.za/portal/individual/login 
  2. Then enter your www.discovery.co.zaUsername and Password and click login
  3. Update your Discovery Credit Card  details and click update after you have completed it( Note:-Do not fail to enter the full details correctly, because the system will credit the R700 on the card details entered).

Regards,

Discovery Miles Team

 

 

Stuur ‘n e-pos aan sysadm@sun.ac.za met Subject: SPAM en heg dan die verdagte e-pos met Insert Item aan.

 

 

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.