%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250716224707+00'00') /ModDate (D:20250716224707+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 5576 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 73.757 521.469 672.977 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 73.757 l 565.984 73.757 l 565.984 745.984 l f 45.266 746.734 m 45.266 73.757 l 46.016 73.757 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(PHISHING SCAM DISGUISED AS AN OUTSURANCE R400 PREMIUM )] TJ ET BT 61.016 676.134 Td /F1 14.4 Tf [(CLAIM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 647.326 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 647.326 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 647.326 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 647.326 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 619.837 Td /F4 9.0 Tf [(This week a phishing scam is in the disguise of an alleged payout by Outsurance of a R400 premium, is circulating. Now if )] TJ ET BT 61.016 608.848 Td /F4 9.0 Tf [(you are an Outsurance member, then this scam can fool you, but there are a number of telltale points that will reveal this )] TJ ET BT 61.016 597.859 Td /F4 9.0 Tf [(mail to be a scam:)] TJ ET BT 78.360 577.886 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 577.870 Td /F4 9.0 Tf [(So-called branding \(with an Outsurance Logo and a Sender that looks like it comes from Outsurance\) are easily )] TJ ET BT 91.016 566.881 Td /F4 9.0 Tf [(counterfeited.)] TJ ET BT 78.360 555.908 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 555.892 Td /F4 9.0 Tf [(Outsurance has most of your details if you are a client and the salutation will always be your name and never just )] TJ ET BT 91.016 544.903 Td /F4 9.0 Tf [("Dear Client".)] TJ ET BT 78.360 533.930 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 533.914 Td /F4 9.0 Tf [(Outsurance does not use Dropbox to deliver ANY documents. They will always use their own systems and usually )] TJ ET BT 91.016 522.925 Td /F4 9.0 Tf [(send PDF documents after informing you via e-mail AFTER calling you personally and confirming some personal )] TJ ET BT 91.016 511.936 Td /F4 9.0 Tf [(details.)] TJ ET BT 78.360 500.963 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 500.947 Td /F4 9.0 Tf [(Outsurance will have a registered contact e-mail address on their system, but they will never ask for your e-mail )] TJ ET BT 91.016 489.958 Td /F4 9.0 Tf [(password. Hopefully, you do not use your University of Stellenbosch e-mail address for as your personal contact )] TJ ET BT 91.016 478.969 Td /F4 9.0 Tf [(address.)] TJ ET BT 78.360 467.996 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 467.980 Td /F4 9.0 Tf [(This e-mail's grammar is terrible. It is very unprofessional and the use of threats such as "PAYOUT will be denied if )] TJ ET BT 91.016 456.991 Td /F4 9.0 Tf [(details are inconsistent/wrong" is usually a typical tactic of phishers.)] TJ ET BT 78.360 446.018 Td /F4 9.0 Tf [(6.)] TJ ET BT 91.016 446.002 Td /F4 9.0 Tf [(Scammers are wanting personal details and your signature. Why? So they can use it to gain access to your other )] TJ ET BT 91.016 435.013 Td /F4 9.0 Tf [(accounts that have money, like bank accounts, or use your signature \(that you sent them\) to sign forged cheques )] TJ ET BT 91.016 424.024 Td /F4 9.0 Tf [(etc.)] TJ ET BT 61.016 404.035 Td /F4 9.0 Tf [(Standard Bank South Africa recently lost R300 million in ATM fraud in Japan this week. The criminals used forged credit )] TJ ET BT 61.016 393.046 Td /F4 9.0 Tf [(cards. No doubt the details on those cards were obtained using names and details that they obtained from phishing scams )] TJ ET BT 61.016 382.057 Td /F4 9.0 Tf [(such as this Outsurance scam. Crime syndicates often exchange and share data they obtain amongst their fellow )] TJ ET BT 61.016 371.068 Td /F4 9.0 Tf [(syndicates and use it to commit fraud.)] TJ ET BT 61.016 351.079 Td /F4 9.0 Tf [(Here is an example of the Outsurance scam mail that is circulating at the moment. We removed the "DropBox" link and )] TJ ET BT 61.016 340.090 Td /F4 9.0 Tf [(the attached file for your safety. )] TJ ET BT 61.016 320.101 Td /F4 9.0 Tf [(~~~)] TJ ET BT 61.016 289.312 Td /F4 9.0 Tf [(From: OUTsurance [mailto:premium@OUTsurance.co.za] )] TJ ET BT 61.016 278.323 Td /F4 9.0 Tf [(Sent: 24 May 2016 08:45 AM)] TJ ET BT 61.016 267.334 Td /F4 9.0 Tf [(To: Recipients )] TJ ET BT 61.016 256.345 Td /F4 9.0 Tf [(Subject: Claim your Outsurance R400 premium)] TJ ET BT 61.016 236.356 Td /F4 9.0 Tf [(Dear Client,)] TJ ET BT 61.016 216.367 Td /F4 9.0 Tf [(Your monthly R400 premium PAYOUT is ready. Please log in to our DropBox document file with correct Email address )] TJ ET BT 61.016 205.378 Td /F4 9.0 Tf [(and Email Password registered with us to confirm details. PAYOUT will be denied if details are inconsistent/wrong. )] TJ ET BT 61.016 194.389 Td /F4 9.0 Tf [(Download, print and sign the forms, attach and email back to us for payment to be effected.)] TJ ET BT 61.016 174.400 Td /F4 9.0 Tf [(OUTsurance premium PAYOUT)] TJ ET 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 61.016 173.249 m 189.041 173.249 l S BT 61.016 154.411 Td /F4 9.0 Tf [(Thank you.)] TJ ET BT 61.016 134.422 Td /F4 9.0 Tf [(© 2015 OUTsurance Insurance Company Limited and OUTsurance Life Insurance Company Limited A Member of the )] TJ ET BT 61.016 123.433 Td /F4 9.0 Tf [(Rand Merchant Insurance Holdings \(RMI\) Group and an Authorised Financial Services Provider FSP \(896\))] TJ ET BT 61.016 103.444 Td /F4 9.0 Tf [( )] TJ ET BT 432.949 83.455 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Contents 13 0 R >> endobj 13 0 obj << /Length 618 >> stream 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 719.245 521.469 38.739 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 719.245 m 566.734 719.245 l 565.984 719.995 l 46.016 719.995 l f 566.734 757.984 m 566.734 719.245 l 565.984 719.995 l 565.984 757.984 l f 45.266 757.984 m 45.266 719.245 l 46.016 719.995 l 46.016 757.984 l f 61.016 734.995 m 550.984 734.995 l 550.984 735.745 l 61.016 735.745 l f 0.400 0.400 0.400 rg BT 61.016 749.193 Td /F2 9.0 Tf [(Posted in:E-mail,Security | | With 0 comments)] TJ ET endstream endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000542 00000 n 0000006170 00000 n 0000006282 00000 n 0000006397 00000 n 0000006517 00000 n 0000006625 00000 n 0000006690 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 7360 %%EOF May « 2016 « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

May, 2016

New phishing message distributed on campus

Friday, May 6th, 2016

This morning we received word of a new phishing e-mail being distributed on campus. (see example below) Please note that the message below is NOT from the University’s IT department. All our e-mails will be branded and in both Afrikaans and English. Ignore these e-mails and delete them. Other signs to look out for are:

1. The e-mail is never addressed to you personally – it’s a generic heading. (e.g. Dear client)
2. It asks the receiver to divulge personal information, for example your ID number, password or username.
3. The e-mail asks you to click on a link to “activate” your account. Don’t click on any links in e-mails (unless it’s an official IT e-mail) and also don’t copy and paste it in your web browser.
4. Usually a short time limit is given, for example “within 24 hours”.
5. Make sure the request is official and legal by calling the company and confirming.
6. Do not send sensitive information by e-mail. Legitimate companies won’t ask you to send data by e-mail.

—————————————————————————————————————————

From: a University staff member [mailto:scammers-email@outlook.com]
Sent: 05 May 2016 11:52 PM
Subject: Outlook WebAccess

Today Thursday 5th  May, 2016. we are upgrading our email system to Outlook Web App 2016. This service creates more space and easy access to email. Please update your account by clicking on Activation below, fill information for activation and submit.

Click for Activation

Inability to complete the information will render your account inactive. 

Thank you.

IT Admin Desk

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.