%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517031721+00'00') /ModDate (D:20240517031721+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 4502 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 348.739 521.469 397.995 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 349.114 520.719 397.245 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(NEW HTML PHISHING SCAM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(There are a number of e-mails arriving in student and personnel accounts that have malware/virus infected attachments, )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(usually *disguised* as .html files.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(The e-mails have subject lines like “UCount reward confirmation” and “Confirmation of epayment” and have .html )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(attachments.  After clicking the link on the webpage that appear, you will be sent to a fraudulent site, which looks just like )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(the institution's web site and you will be asked for various sensitive information. Although the Trojan attachment does not )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(install anything into the system, it utilizes the "social engineering" technique to force users fill in their personal data on a )] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [(fraudulent web site.)] TJ ET 0.400 0.400 0.400 RG 85.866 471.926 m 85.866 472.339 85.696 472.748 85.404 473.040 c 85.113 473.332 84.703 473.501 84.291 473.501 c 83.878 473.501 83.469 473.332 83.177 473.040 c 82.885 472.748 82.716 472.339 82.716 471.926 c 82.716 471.514 82.885 471.104 83.177 470.813 c 83.469 470.521 83.878 470.351 84.291 470.351 c 84.703 470.351 85.113 470.521 85.404 470.813 c 85.696 471.104 85.866 471.514 85.866 471.926 c f BT 91.016 469.110 Td /F3 9.0 Tf [(Always beware when asked for private information.)] TJ ET 85.866 460.937 m 85.866 461.350 85.696 461.759 85.404 462.051 c 85.113 462.343 84.703 462.512 84.291 462.512 c 83.878 462.512 83.469 462.343 83.177 462.051 c 82.885 461.759 82.716 461.350 82.716 460.937 c 82.716 460.525 82.885 460.115 83.177 459.824 c 83.469 459.532 83.878 459.362 84.291 459.362 c 84.703 459.362 85.113 459.532 85.404 459.824 c 85.696 460.115 85.866 460.525 85.866 460.937 c f BT 91.016 458.121 Td /F3 9.0 Tf [(Do not click on links in e-mail and do not copy-paste them into your browser.)] TJ ET 85.866 449.948 m 85.866 450.361 85.696 450.770 85.404 451.062 c 85.113 451.354 84.703 451.523 84.291 451.523 c 83.878 451.523 83.469 451.354 83.177 451.062 c 82.885 450.770 82.716 450.361 82.716 449.948 c 82.716 449.536 82.885 449.126 83.177 448.835 c 83.469 448.543 83.878 448.373 84.291 448.373 c 84.703 448.373 85.113 448.543 85.404 448.835 c 85.696 449.126 85.866 449.536 85.866 449.948 c f BT 91.016 447.132 Td /F3 9.0 Tf [(Open a new browser window and type in the company's correct address.)] TJ ET 85.866 438.959 m 85.866 439.372 85.696 439.781 85.404 440.073 c 85.113 440.365 84.703 440.534 84.291 440.534 c 83.878 440.534 83.469 440.365 83.177 440.073 c 82.885 439.781 82.716 439.372 82.716 438.959 c 82.716 438.547 82.885 438.137 83.177 437.846 c 83.469 437.554 83.878 437.384 84.291 437.384 c 84.703 437.384 85.113 437.554 85.404 437.846 c 85.696 438.137 85.866 438.547 85.866 438.959 c f BT 91.016 436.143 Td /F3 9.0 Tf [(Make sure such requests are genuine by, for example, calling a known company's phone number.)] TJ ET 85.866 427.970 m 85.866 428.383 85.696 428.792 85.404 429.084 c 85.113 429.376 84.703 429.545 84.291 429.545 c 83.878 429.545 83.469 429.376 83.177 429.084 c 82.885 428.792 82.716 428.383 82.716 427.970 c 82.716 427.558 82.885 427.148 83.177 426.857 c 83.469 426.565 83.878 426.395 84.291 426.395 c 84.703 426.395 85.113 426.565 85.404 426.857 c 85.696 427.148 85.866 427.558 85.866 427.970 c f BT 91.016 425.154 Td /F3 9.0 Tf [(Do not send sensitive information by e-mail. Legitimate companies do not ask you to send important data by e-mail.)] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(Be careful out there. The reason why scammers are so successful is because they catch people regularly!)] TJ ET BT 432.949 385.176 Td /F3 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET BT 61.016 366.687 Td /F3 9.0 Tf [(Posted in:E-mail,Security | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj xref 0 11 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000294 00000 n 0000000323 00000 n 0000000458 00000 n 0000000521 00000 n 0000005075 00000 n 0000005187 00000 n 0000005294 00000 n trailer << /Size 11 /Root 1 0 R /Info 5 0 R >> startxref 5410 %%EOF New html phishing scam « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

New html phishing scam

There are a number of e-mails arriving in student and personnel accounts that have malware/virus infected attachments, usually *disguised* as .html files.

The e-mails have subject lines like “UCount reward confirmation” and “Confirmation of epayment” and have .html attachments.  After clicking the link on the webpage that appear, you will be sent to a fraudulent site, which looks just like the institution’s web site and you will be asked for various sensitive information. Although the Trojan attachment does not install anything into the system, it utilizes the “social engineering” technique to force users fill in their personal data on a fraudulent web site.

  • Always beware when asked for private information.
  • Do not click on links in e-mail and do not copy-paste them into your browser.
  • Open a new browser window and type in the company’s correct address.
  • Make sure such requests are genuine by, for example, calling a known company’s phone number.
  • Do not send sensitive information by e-mail. Legitimate companies do not ask you to send important data by e-mail.

Be careful out there. The reason why scammers are so successful is because they catch people regularly!

[ARTICLE BY DAVID WILES]

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.