Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

E-mail

New spam e-mail distributed on campus

Friday, July 8th, 2016

New spam e-mail distributed on campus asking you to validate your account, otherwise it will be deleted. Please ignore and delete this. IT will never ask you to validate your account in this way.

Also take note that the contact details are incorrect, the e-mail is vaguely addressed to “Dear Student/Member” and not personalised and there’s no reference to IT itself. All our e-mails are sent on a specific template and in both languages.

If in doubt, rather call us at x4367 to check if an e-mail is legitimate.

 

——– Original message ——–
From: “Espina, Juliette” <jae16c@my.fsu.edu>
Date:06/07/2016 12:38 (GMT+02:00)
To:
Cc:
Subject: NOTICE

Dear Student/Member,

Please note that we are canceling unused sun.ac.za email account to create more space for new accounts.

Kindly follow the link below to validate your account: 

http://bit.ly/2925RgV 

 

Thank you

Support Team.

Administration B building, 

Victoria Street, Stellenbosch

18° 51′ 47.536″ East 33° 56′ 1.327″

Phishing scam disguised as an Outsurance R400 premium claim

Wednesday, May 25th, 2016

This week a phishing scam is in the disguise of an alleged payout by Outsurance of a R400 premium, is circulating. Now if you are an Outsurance member, then this scam can fool you, but there are a number of telltale points that will reveal this mail to be a scam:

  1. So-called branding (with an Outsurance Logo and a Sender that looks like it comes from Outsurance) are easily counterfeited.
  2. Outsurance has most of your details if you are a client and the salutation will always be your name and never just “Dear Client”.
  3. Outsurance does not use Dropbox to deliver ANY documents. They will always use their own systems and usually send PDF documents after informing you via e-mail AFTER calling you personally and confirming some personal details.
  4. Outsurance will have a registered contact e-mail address on their system, but they will never ask for your e-mail password. Hopefully, you do not use your University of Stellenbosch e-mail address for as your personal contact address.
  5. This e-mail’s grammar is terrible. It is very unprofessional and the use of threats such as “PAYOUT will be denied if details are inconsistent/wrong” is usually a typical tactic of phishers.
  6. Scammers are wanting personal details and your signature. Why? So they can use it to gain access to your other accounts that have money, like bank accounts, or use your signature (that you sent them) to sign forged cheques etc.

Standard Bank South Africa recently lost R300 million in ATM fraud in Japan this week. The criminals used forged credit cards. No doubt the details on those cards were obtained using names and details that they obtained from phishing scams such as this Outsurance scam. Crime syndicates often exchange and share data they obtain amongst their fellow syndicates and use it to commit fraud.

Here is an example of the Outsurance scam mail that is circulating at the moment. We removed the “DropBox” link and the attached file for your safety. 

~~~

From: OUTsurance [mailto:premium@OUTsurance.co.za]
Sent: 24 May 2016 08:45 AM
To: Recipients <premium@OUTsurance.co.za>
Subject: Claim your Outsurance R400 premium

Dear Client,

Your monthly R400 premium PAYOUT is ready. Please log in to our DropBox document file with correct Email address and Email Password registered with us to confirm details. PAYOUT will be denied if details are inconsistent/wrong. Download, print and sign the forms, attach and email back to us for payment to be effected.

OUTsurance premium PAYOUT

Thank you.

© 2015 OUTsurance Insurance Company Limited and OUTsurance Life Insurance Company Limited A Member of the Rand Merchant Insurance Holdings (RMI) Group and an Authorised Financial Services Provider FSP (896)

 

[ARTICLE BY DAVID WILES]

How safe is information on your device?

Wednesday, May 25th, 2016

Smartphones frequently act as the control centres where we schedule meetings, send e-mails and socialise. To satisfy these needs, they require personal information.

Our lives are documented and stored in e-mails, social networks and the apps we install on our phones. All this information syncs seamlessly with your work PC or your tablet. And after initial  set up, it might not even prompt you for a password again. Wonderful news if you are terrible at remembering passwords. Also, wonderful news if you are the thief who steals a smartphone.

What information would a clever criminal get his hands on if you lose your smartphone now? Banking information? A copy of your ID or passport saved somewhere in your e-mail? All your holiday photos on Dropbox? 

Here are a few tips to ensure he won’t be able to get to it:

  1. Always enable the password option on your phone to lock your screen. Most phones have various options – typing in a password, a pin code or even swiping a sequence of dots. This is your first line of defence.
  2.  Don’t select “remember password” on any of your apps or your e-mail applications. Yes, it is a nuisance to type in your password, but do you really want someone else to read your e-mails? 
  3. Turn off cookies and autofill. This prevents your device from remembering your username and possibly even your password at websites you regularly visit.
  4. If you need to access sensitive information, e.g. banking, rather go to the website, via a web browser, than using an app.
  5. Set up your phone to be tracked if you do lose it. (Read our previous instructions on locating lost or stolen devices here.) A device can also be wiped remotely in some cases, which at least ensures that your information doesn’t end up being used, even though your actual device is.

Remember that you also need to remove ALL personal data (for example e-mails, SMS’s and telephone numbers) and anything which could connect you to the phone when you sell or dispose of it. 

Phishing scammmers change tactics

Tuesday, May 10th, 2016

Earlier this week Tygerberg was subjected to a particularly pervasive attempt by phishing fraudsters to obtain usernames and passwords from users by fooling them to “Activating” their Outlook 2016 account.

Although mostly unsuccessful due to the fact that most personnel are wide awake and sensitive to phishing attacks, this does not stop the attempts. The fraudsters merely change their tactics. Stealing data and gaining access to personal details such as usernames and passwords is very, very profitable!

Today’s phishing scam uses a different method by hiding behind an educational institution’s name and adding a “throw-away” website address at the end.

——————————————————————

Dear Account User,

We are shutting down your Bulk SMS, Cellfindportal today in a course to activate Microsoft Outlook Web access 2016. You need to upgrade your Bulk SMS, Cellfindportal immediately otherwise it will be deactivated. 

To activate go to http://bulk-sms-cellfindportal-sun.ac.za.webeden.co.uk 

The Information Technology department encourages you to take the following measures to protect your account.

Sincerely

IT Customer Support Center© 2016 CELL FIND LLC. All Rights Reserved

The University of Stellenbosch is a charitable body, registered in

Republic of South Africa, with registration number ZA005336.

——————————————————————

We’ve removed the dangerous part of the mail, but you hopefully can see how we can be fooled if we see the “sun.ac.za” address and see the “disclaimer” at the end, and think that it is from the University.

Information Technology will never send you mail like this and if they do mail you, it will always be branded and linked to a sun.ac.za site, and the grammar will be a lot better than this example, and will be bilingual at least!

[ARTICLE BY DAVID WILES]

272 million e-mail addresses hacked

Monday, May 9th, 2016

On Wednesday the Internet was abuzz with news of a Wisconsin security firm obtaining a database of 272 million e-mail addresses, with their associated passwords, from a Russian fraudster.

How did a cyber criminal get his hands on the e-mail addresses and passwords?

Easily, by using the same phishing tricks that we regularly warn you about – using an e-mail, warning you about upgrades to Outlook and that you must “CLICK” on the link to activate the upgrades or your account. Victims literally give their e-mail address and password to the fraudster.

Several of our colleagues were fooled by the mail and did actually go to the site and unwittingly gave their details to the scammers. Luckily, we were able to help them quickly to undo the damage.

However, in retrospect, a deeper problem was picked up:

The stolen passwords and email addresses from the Russian database, which included Gmail, Yahoo and Russia’s mail.ru accounts, were not hacked directly from GMail or Yahoo but they had been taken from various smaller, less secure websites where people use their email addresses along with the SAME password to log in.

Those people who tend to use the same password for multiple sites as well as their email are at risk and should change their email password and avoid using “one password for everything”. It is like having a master key for every lock on your house. If that key is stolen then burglars can get access to every locked door in your house using one key!

Secondly, if you suspect your e-mail password has been compromised and you change your password, it should always be changed to something COMPLETELY different. In other words if your password is for instance “Christopher123”, then changing your password to “Christopher124” is not good enough that change is easily guessed.

If you have a Gmail or Yahoo account and are concerned that your e-mail address is possibly on the Russian database, then you can go to the following links: (they are safe as they do not ask for passwords)

http://securityalert.knowem.com/
https://haveibeenpwned.com/

[ARTICLE BY DAVID WILES]

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.