%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250716172929+00'00') /ModDate (D:20250716172929+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 6801 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 125.618 521.469 621.116 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 125.993 520.719 620.366 re S 0.773 0.773 0.773 rg 61.016 141.368 m 550.984 141.368 l 550.984 142.118 l 61.016 142.118 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WARNING: SEXTORTION SCAM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 02,2021)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(There is a "sextortion" email making the rounds at the moment and with many personnel and students still working )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(andstudying from home, many are concerned about the risks.)] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 604.453 Td /F4 9.0 Tf [("The device has been successfully hacked" is a new ‘sextortion’ email scam for 2021. This email scam, like most )] TJ ET BT 61.016 593.464 Td /F4 9.0 Tf [(sextortion scams, relies on “social engineering”, a process through which the scammers induce shame, panic or guilt. The )] TJ ET BT 61.016 582.475 Td /F4 9.0 Tf [(scammers \(the authors of the email\) claim that they obtained material compromising the user \(because of a computer )] TJ ET BT 61.016 571.486 Td /F4 9.0 Tf [(hack, email account hack, router hack, etc\) and threaten to publish it if the ransom is not paid. None these claims are true )] TJ ET BT 61.016 560.497 Td /F4 9.0 Tf [(in any way; they are just deception.)] TJ ET BT 61.016 549.508 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 538.519 Td /F4 9.0 Tf [(The “The device has been successfully hacked” email message says that someone successfully hacked the recipient’s )] TJ ET BT 61.016 527.530 Td /F4 9.0 Tf [(device and monitored it for a long time. The hacker claims that this was made possible by a virus installed on the device )] TJ ET BT 61.016 516.541 Td /F4 9.0 Tf [(when the user visited the adult site. Using this virus, the hacker was able to record a video that compromises the user, and )] TJ ET BT 61.016 505.552 Td /F4 9.0 Tf [(gained access to the user’s personal contacts, instant messengers, and social networks. If the recipient pays $1300 in )] TJ ET BT 61.016 494.563 Td /F4 9.0 Tf [(Bitcoin, the hacker promises to delete all the data. Next, the scam email contains the bitcoin address to which the ransom )] TJ ET BT 61.016 483.574 Td /F4 9.0 Tf [(should be transferred. This email is just a sextortion scam, and all the statements are fake. )] TJ ET BT 61.016 472.585 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 461.596 Td /F4 9.0 Tf [(What to do when you receive the "The device has been successfully hacked" SCAM: )] TJ ET 0.153 0.153 0.153 RG 85.866 444.423 m 85.866 444.835 85.696 445.245 85.404 445.537 c 85.113 445.828 84.703 445.998 84.291 445.998 c 83.878 445.998 83.469 445.828 83.177 445.537 c 82.885 445.245 82.716 444.835 82.716 444.423 c 82.716 444.011 82.885 443.601 83.177 443.309 c 83.469 443.018 83.878 442.848 84.291 442.848 c 84.703 442.848 85.113 443.018 85.404 443.309 c 85.696 443.601 85.866 444.011 85.866 444.423 c f BT 91.016 441.607 Td /F4 9.0 Tf [(Do not panic.)] TJ ET 85.866 433.434 m 85.866 433.846 85.696 434.256 85.404 434.548 c 85.113 434.839 84.703 435.009 84.291 435.009 c 83.878 435.009 83.469 434.839 83.177 434.548 c 82.885 434.256 82.716 433.846 82.716 433.434 c 82.716 433.022 82.885 432.612 83.177 432.320 c 83.469 432.029 83.878 431.859 84.291 431.859 c 84.703 431.859 85.113 432.029 85.404 432.320 c 85.696 432.612 85.866 433.022 85.866 433.434 c f BT 91.016 430.618 Td /F4 9.0 Tf [(Do not pay a ransom.)] TJ ET 85.866 422.445 m 85.866 422.857 85.696 423.267 85.404 423.559 c 85.113 423.850 84.703 424.020 84.291 424.020 c 83.878 424.020 83.469 423.850 83.177 423.559 c 82.885 423.267 82.716 422.857 82.716 422.445 c 82.716 422.033 82.885 421.623 83.177 421.331 c 83.469 421.040 83.878 420.870 84.291 420.870 c 84.703 420.870 85.113 421.040 85.404 421.331 c 85.696 421.623 85.866 422.033 85.866 422.445 c f BT 91.016 419.629 Td /F4 9.0 Tf [(If there’s a link in the scam email, do not click it, otherwise you might unwittingly install malware or ransomware on )] TJ ET BT 91.016 408.640 Td /F4 9.0 Tf [(your computer.)] TJ ET BT 61.016 388.651 Td /F4 9.0 Tf [(The mail will come from several e-mail addresses, which might very from user to user. Scammers use thousands of "throw-)] TJ ET BT 61.016 377.662 Td /F4 9.0 Tf [(away" e-mail addresses to send out these scams.)] TJ ET BT 61.016 366.673 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 355.684 Td /F4 9.0 Tf [(If you do get such an e-mail use one of the two methods below to report it to IT Cyber Security as soon as possible. This )] TJ ET BT 61.016 344.695 Td /F4 9.0 Tf [(way IT can filter and block the senders)] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 337.997 m 306.516 337.997 l 305.766 337.247 l 305.766 337.247 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 335.747 m 306.516 335.747 l 305.766 336.497 l 305.766 336.497 l f 306.516 337.997 m 306.516 335.747 l 305.766 336.497 l 305.766 337.247 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 337.997 m 305.016 335.747 l 305.766 336.497 l 305.766 337.247 l f 0.153 0.153 0.153 rg BT 61.016 317.956 Td /F1 9.0 Tf [(By reporting it on the ICT Partner Portal.??)] TJ ET BT 61.016 297.967 Td /F4 9.0 Tf [(Go to https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115. )] TJ ET BT 61.016 277.978 Td /F4 9.0 Tf [(Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.??)] TJ ET BT 61.016 257.989 Td /F4 9.0 Tf [(If you have accidentally responded to the phisher and already provided them with your personal details, it is vitally )] TJ ET BT 61.016 247.000 Td /F4 9.0 Tf [(important that you immediately go to the USERADM page \(either http://www.sun.ac.za/password or )] TJ ET BT 61.016 236.011 Td /F4 9.0 Tf [(www.sun.ac.za/useradm and change your password immediately.\))] TJ ET BT 61.016 216.022 Td /F4 9.0 Tf [(Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as )] TJ ET BT 61.016 205.033 Td /F4 9.0 Tf [(changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on )] TJ ET BT 61.016 194.044 Td /F4 9.0 Tf [(these accounts. Contact the IT HelpDesk if you are still unsure.)] TJ ET BT 432.949 174.055 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET 0.400 0.400 0.400 rg BT 61.016 155.566 Td /F2 9.0 Tf [(Posted in:E-mail,News,Security | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj xref 0 12 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000535 00000 n 0000007388 00000 n 0000007500 00000 n 0000007615 00000 n 0000007735 00000 n trailer << /Size 12 /Root 1 0 R /Info 5 0 R >> startxref 7843 %%EOF E-mail « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

E-mail

Phishing from staff email

Monday, October 14th, 2019

An email with the subject “Purchase Order 98474” has been sent from a sun email address to staff and students. The email ask you to click on a link to open your purchase order information (also see image below)

This is not a legitimate email, but a phishing attempt from a compromised university account.

By clicking on links and providing your information, you give criminals access to your personal information and your accounts. If you think your account or device has been compromised or you notice suspicious activity:

Immediately change your password on www.sun.ac.za/password.

Contact the IT Service Desk by logging a request or calling 808 4367. 

Phishing from staff email

Monday, August 26th, 2019

Three separate emails with the subjects “Information Service”, “Online course” and “IT communication” from a compromised staff email address were sent to staff and students recently. The emails ask you to click on a link which will open an incident logged on the “Self Service Portal”, click on a link to complete a survey or activate two-factor authentication. One of these used Information Technology’s own branding to try and phish our staff and students.(also see images below)

None of these are legitimate emails, but phishing attempts from a compromised university account.

By clicking on links and providing your information, you give criminals access to your personal information and your accounts.

    • Immediately change your password on www.sun.ac.za/password.
    • Contact the IT Service Desk by logging a request or calling 808 4367.
    • More information is available on our blog and Twitter.

 

Phishing with subject “Verify Your Email To Avoid Disruption”

Friday, June 7th, 2019

An email with the subject “Verify Your Email To Avoid Disruption” which looks as if it’s from “Stellenbosch University – Outlook Office 365” was sent to staff and students. The email asks you to click on a link to verify your Outlook account. (see image)

This is not a legitimate email from Information Technology, but a phishing attempt.

We will never ask you to provide any personal information by means of email. By clicking on links and providing your information, you give criminals access to your personal information and your accounts.

If you clicked on the link in this phishing email, immediately change your password on www.sun.ac.za/password. For enquiries contact the IT Service Desk by logging a request or calling 808 4367. More information on phishing is available on our blog and Twitter.

Malware warning

Tuesday, April 16th, 2019

Emails with the subjects “Have you received your payment” and “Apply for a loan” are being distributed to students and staff. Please do not open these since they could contain an embedded file which will infect your device with malware.

When you receive emails with attachments from unknown senders, keep in mind that you should never open attachments as they could contain malicious content.

If you think your account or device has been compromised or you notice suspicious activity:

  1. Immediately change your password on www.sun.ac.za/password.
  2. Contact the IT Service Desk by logging a request or calling 808 4367.
  3. More information is available on our blog and Twitter.

Increase in phishing attacks

Wednesday, April 3rd, 2019

Phishing attacks are on the increase due to staff and students replying to phishing emails or entering their usernames and passwords on suspicious websites.

This not only poses a security risk for the user, but also for their colleagues and more importantly, for the safety of our entire university network.

Please do not reply to any email requesting your username and password, even if it’s seemingly from someone you know. This information is used by phishing attackers to target our students and staff. By supplying your private information you are making it much easier for them to access accounts and the network.

If you think your account has been compromised or notice suspicious activity:

  • Immediately change your password on www.sun.ac.za/password.
  • Contact the IT Service Desk by logging a request or calling 808 4367.
  • More information on phishing is available on our blog and Twitter.
 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.