%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250718221157+00'00') /ModDate (D:20250718221157+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 3736 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 343.637 521.469 403.097 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 344.012 520.719 402.347 re S 0.773 0.773 0.773 rg 61.016 359.387 m 550.984 359.387 l 550.984 360.137 l 61.016 360.137 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(COMPROMISED STUDENT ACCOUNT USED FOR PHISHING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Just because mail seems to come from a university address, doesn’t mean to say that it is legitimate.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(The latest phishing scam making its rounds at the university is being sent from a compromised student account. The )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(subject line is all in capital letters and is meant to frighten you into clicking on a link and filling in your details. This is )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(probably how the student account that is now sending it was originally compromised.)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(This is a typical phishing scam. Do not respond or click on any of the links. Many thanks to all the observant students who )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(picked it up and pointed it out to us.)] TJ ET BT 61.016 544.486 Td /F4 9.0 Tf [(Below is an example of the mail \(with the dangerous bits removed\))] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 534.788 m 306.516 534.788 l 305.766 534.038 l 305.766 534.038 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 532.538 m 306.516 532.538 l 305.766 533.288 l 305.766 533.288 l f 306.516 534.788 m 306.516 532.538 l 305.766 533.288 l 305.766 534.038 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 534.788 m 305.016 532.538 l 305.766 533.288 l 305.766 534.038 l f 0.153 0.153 0.153 rg BT 61.016 514.747 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 494.758 Td /F1 9.0 Tf [(From: )] TJ ET 0.373 0.169 0.255 rg BT 89.015 494.758 Td /F4 9.0 Tf [(Compromised, Student account <12345678@sun.ac.za>)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 89.015 493.607 m 315.770 493.607 l S 0.153 0.153 0.153 rg BT 61.016 483.769 Td /F1 9.0 Tf [(Sent: )] TJ ET BT 86.018 483.769 Td /F4 9.0 Tf [(Monday, 17 April 2017 12:19 PM)] TJ ET BT 61.016 472.780 Td /F1 9.0 Tf [(To: )] TJ ET 0.373 0.169 0.255 rg BT 77.513 472.780 Td /F4 9.0 Tf [(fake@email.address)] TJ ET 0.18 w 0 J [ ] 0 d 77.513 471.629 m 159.674 471.629 l S 0.153 0.153 0.153 rg BT 61.016 461.791 Td /F1 9.0 Tf [(Subject: )] TJ ET BT 99.023 461.791 Td /F4 9.0 Tf [(YOUR EMAIL ACCOUNT HAS BEEN COMPROMISED)] TJ ET BT 61.016 441.802 Td /F4 9.0 Tf [( )] TJ ET BT 61.016 421.813 Td /F4 9.0 Tf [(Certify Your email )] TJ ET 0.373 0.169 0.255 rg BT 135.032 421.813 Td /F1 9.0 Tf [(HERE)] TJ ET 0.18 w 0 J [ ] 0 d 135.032 420.383 m 160.034 420.383 l S 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 412.115 m 306.516 412.115 l 305.766 411.365 l 305.766 411.365 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 409.865 m 306.516 409.865 l 305.766 410.615 l 305.766 410.615 l f 306.516 412.115 m 306.516 409.865 l 305.766 410.615 l 305.766 411.365 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 412.115 m 305.016 409.865 l 305.766 410.615 l 305.766 411.365 l f 0.153 0.153 0.153 rg BT 432.949 392.074 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET 0.400 0.400 0.400 rg BT 61.016 373.585 Td /F2 9.0 Tf [(Posted in:Security | Tagged:Phishing,Security,Spam | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 89.0147 493.9252 315.7697 503.0827 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (mailto:noreply@sun.ac.za) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 77.5127 471.9472 159.6737 481.1047 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (mailto:noreply@sun.ac.za) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 135.0317 420.9802 160.0337 430.1377 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/10/how-to-recognise-a-phishing-e-mail/) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000568 00000 n 0000004356 00000 n 0000004468 00000 n 0000004583 00000 n 0000004703 00000 n 0000004811 00000 n 0000004938 00000 n 0000005014 00000 n 0000005141 00000 n 0000005217 00000 n 0000005345 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 5469 %%EOF security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

security

Scam: Cancellation Of Debit Order (Absa)

Monday, October 29th, 2012

Please note the following phishing scam: These scams are becoming far more fine-tuned to South African victims and especially university accounts. Earlier this month there was a specific scam using Alexander-Forbes as a means to attack, Alexander-Forbes being the university’s preferred consultant for insurance, medical aid consultancy etc. Barely a week later Virgin Active’s name was used to attempt to scam university personnel. This week it is the turn of Outsurance. The e-mails are virtually identical, only the names and the servers in the background change, but you should be able to see that they are homing more and more to South African users, which tells me one thing that either they are getting this information from South African victims or these scamming operations are South-African based.   Here is an expurgated version of the scam. Please take note and be very careful!  From: Absa [mailto:ibt@onlinedata.co.za] Sent: 29 October 2012 01:46 PM To: Name <university_email@address.goes.here> Subject: Cancellation Of Debit Order(Absa) Dear Customer, We received a Debit Order alert on your account this morning from Outsurance Insurance Company to deduct the sum of R3150.00 from your account. If you don’t want to authorized this Debit Order you can cancel by following the instruction below. Click below to Cancel the Debit Order on your profile. You will receive a message on your cellphone with a link, type in the last Eight digit RVN on the SMS message to complete the cancellation. click here to Cancel. . Regards, Security Department

(INFORMATION SUPPLIED BY DAVID WILES)

What is ransomware?

Friday, October 12th, 2012

The term ransomware will leave most people flabbergasted. How can software hold something ransom or is technology becoming so clever it can take over anything?

However, this description isn’t as far-fetched as it seems. Ransomware forms part of a group of malicious computer software called malware,  which cunningly installs itself on your pc and then has t he audacity to demand data or money from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with malware installed on it. Ransomware” is also known as a a cryptovirus, cryptotrojan or cryptoworm.

The software indeed “kidnaps” your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access.  The only way access is possible again, is by acquiring an encryption key from the creator of the ransomware at a fee.

A more recent version of the software will not notify the user that ransomware has been installed, but will merely block all access to the data and depend on the victim to search the internet for information on their “problem”. This search will then lead them to legit websites selling software to remove the ransomware, which of course is sold by the creator of the original culprit.

Ransomware is nothing new. In 1996 security experts at Columbia University and IBM wrote an essay called “Cryptovirology: Extortion-Based Security Threats and Countermeasures” to describe the software. At that time businesses were the main targets of ransomware and not individuals.

In March 2006 ransomware called Crypzip of Zippo was sent to a group of internet users. Those who received the programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.

Most antivirus vendors have ways of detecting and blocking the most known ransomware. However, no data is 100% safe. To ensure you don’t find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the internet and under no circumstances open e-mail attachments from unknown sources.

More info on the latest ransomware targeting Skype users.

SOURCE: Wikipedia, Microsoft en Techtarget.

Watch out for fraudulent emails regarding banking

Tuesday, February 28th, 2012

We’re still receiving complaints from users who fall victim to cyber criminals by blindly submitting their banking details via email. (see example below) Staff are once again warned under NO circumstances to do any activation of your bank details by clicking on a link in an email. Pay attention to the following: –  Your bank will never send you an email requesting personal and confidential information. – The address where the email is sent from is not an official bank email address. It might seem similar, but if you look closely you’ll notice small differences. – Take note of the address where the link diverts you to when you click on it. You will immediately notice it’s not a typical bank web address, but something completely unrelated. – You will also see that your name is never mentioned in the email. It’s a generic email sent to random people to harvest their information. If any irregularities occur on your account, your bank will call you. You also won’t receive an email from them if a large amount is deposited into your bank account. Remember, a cyber criminal knows what will grab your attention. If you have any doubts, rather contact your bank directly and make sure.


Begin forwarded message: From: “NOTIFICATIONS@notify.com” Subject: ABSA:Security Centre Date: 28 February 2012 7:32:07 AM SAST To: Recipients We noticed illegal activities on your account, due to this, we have temporarily suspended your account. We need you to update your account information for your online banking to be re-activated click below or visit your nearest branch Re-activate now Terms Of Use | Banking Regulations | Privacy Policy | Security Centre | Site Map Authorised Financial Services Provider and a registered credit provider (NCRCP7) a

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.