%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20220127063115+00'00') /ModDate (D:20220127063115+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4361 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 266.794 521.469 479.940 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 267.169 520.719 479.190 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HOW DO I REPORT PHISHING?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(You've received a suspicious email, what should you do with it? Firstly, don't click on any links. But just as important, send )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team \(CSIRT\) )] TJ ET BT 61.016 531.066 Td /F3 9.0 Tf [(can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.)] TJ ET BT 61.016 511.077 Td /F4 9.0 Tf [(What is phishing?)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(Phishing attacks are designed to steal a personís login and password details so that the cyber criminal can assume control )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(of the victimís social network, email, and online bank accounts. Seventy percent of internet users choose the same )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(login details, can access multiple private accounts and manipulate them for their own good.†)] TJ ET 0.373 0.169 0.255 rg BT 61.016 438.132 Td /F3 9.0 Tf [(More on how to recognise a phishing email.†)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 436.981 m 237.092 436.981 l S 0.200 0.200 0.200 rg BT 61.016 418.143 Td /F4 9.0 Tf [(REPORT PHISHING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 398.154 Td /F4 9.0 Tf [(On the ICT Partner Portal:)] TJ ET 0.400 0.400 0.400 RG 85.866 380.981 m 85.866 381.394 85.696 381.803 85.404 382.095 c 85.113 382.387 84.703 382.556 84.291 382.556 c 83.878 382.556 83.469 382.387 83.177 382.095 c 82.885 381.803 82.716 381.394 82.716 380.981 c 82.716 380.569 82.885 380.159 83.177 379.868 c 83.469 379.576 83.878 379.406 84.291 379.406 c 84.703 379.406 85.113 379.576 85.404 379.868 c 85.696 380.159 85.866 380.569 85.866 380.981 c f BT 91.016 378.165 Td /F3 9.0 Tf [(Go to†)] TJ ET 0.373 0.169 0.255 rg BT 115.532 378.165 Td /F3 9.0 Tf [(https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 115.532 377.014 m 412.649 377.014 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 369.992 m 85.866 370.405 85.696 370.814 85.404 371.106 c 85.113 371.398 84.703 371.567 84.291 371.567 c 83.878 371.567 83.469 371.398 83.177 371.106 c 82.885 370.814 82.716 370.405 82.716 369.992 c 82.716 369.580 82.885 369.170 83.177 368.879 c 83.469 368.587 83.878 368.417 84.291 368.417 c 84.703 368.417 85.113 368.587 85.404 368.879 c 85.696 369.170 85.866 369.580 85.866 369.992 c f BT 91.016 367.176 Td /F3 9.0 Tf [(Fill in your information and add the email as an attachment. Your request will automatically be logged on the )] TJ ET BT 91.016 356.187 Td /F3 9.0 Tf [(system.?)] TJ ET BT 61.016 336.198 Td /F4 9.0 Tf [(*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be )] TJ ET BT 61.016 325.209 Td /F4 9.0 Tf [(forwarded. This ensures the original email can be analysed with its full Internet message headers intact.†)] TJ ET BT 61.016 314.220 Td /F3 9.0 Tf [(Alternatively, use the mail application to save the email \(usually located under File | Save As\) as an .EML or .MSG format )] TJ ET BT 61.016 303.231 Td /F3 9.0 Tf [(to a folder location, and attach the saved file to a new email.)] TJ ET BT 61.016 284.742 Td /F3 9.0 Tf [(Posted in:Phishing,Security,Tips | Tagged:Malware,Phishing,Report Phishing,Report Spam,Spam | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 437.2996 237.0917 446.4571 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/10/how-to-recognise-a-phishing-e-mail/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 115.5317 377.3326 412.6487 386.4901 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000558 00000 n 0000004971 00000 n 0000005083 00000 n 0000005190 00000 n 0000005306 00000 n 0000005426 00000 n 0000005553 00000 n 0000005677 00000 n 0000005805 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 5932 %%EOF report spam « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

report spam

How do I report phishing?

Tuesday, October 5th, 2021

You’ve received a suspicious email, what should you do with it? Firstly, don’t click on any links. But just as important, send it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team (CSIRT) can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.

What is phishing?

Phishing attacks are designed to steal a person’s login and password details so that the cyber criminal can assume control of the victim’s social network, email, and online bank accounts. Seventy percent of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. 

More on how to recognise a phishing email. 

Report phishing

On the ICT Partner Portal:

*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be forwarded. This ensures the original email can be analysed with its full Internet message headers intact. Alternatively, use the mail application to save the email (usually located under File | Save As) as an .EML or .MSG format to a folder location, and attach the saved file to a new email.

“Cryptocurrency” scam email

Wednesday, March 28th, 2018

Please be aware of a  scam making the rounds since yesterday.

It is a “Crypto-currency” (bitcoin) scam that comes in the form of an e-mail from an unknown sender (currently an address from name@dacfinance.online). It will look like this:

 


 

Hi, how are you?
I hope you are okay

 I’ve been trying to reach you for the past couple of days.

Something MAJOR is happening in the trading world and I want you to know about it.

>> Check this with your email somebody@sun.ac.za

 Are you ready for that kind of spending power?

Many people already started to trade cryptocurrencies, BitCoin and LiteCoin.

Join now to our Group!

 To your success,
Some Name
 DAC Finance

cryptocurrency.website address

 


 

This is a sneaky attempt to defraud users seeking an opportunity to invest in Bitcoins (crypto-currency). The website you are taken to¬†is filled with fake testimonials, inflated bank account numbers, exaggerated claims of easy money and various other lies and fabrications. The software that you would be asked to install is fake and will compromise security on your computer and be used to¬†send spam. Furthermore, victims will have to pay anything up to $250 to join the “investment” scheme and the only thing¬†that will happen is that you will be $250 poorer.¬†Here is an example of the website page:

Do not respond to this mail or be tempted to join this scheme. The fact that university e-mail addresses reused and the claims look legitimate should rather be a warning.

As always if you have received mail that looks like this, please immediately report it to the Information Technology Security Team using the following method:

Send the spam/phishing mail to help@sun.ac.za and sysadm@sun.ac.za.
Attach the phishing or suspicious mail on to the message if possible.
1. Start up a new mail addressed to sysadm@sun.ac.za (CC: help@sun.ac.za)
2. Use the Title ‚ÄúSPAM‚ÄĚ (without quotes) in the Subject.
3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an enclosure and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
4. Send the mail.

[Article by David Wiles]

 

© 2013-2022 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.