{"id":5481,"date":"2014-02-25T10:22:40","date_gmt":"2014-02-25T08:22:40","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=5481"},"modified":"2016-01-18T15:08:59","modified_gmt":"2016-01-18T13:08:59","slug":"another-phishing-scam-this-time-from-a-university-account","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2014\/02\/another-phishing-scam-this-time-from-a-university-account\/","title":{"rendered":"<!--:en-->Another phishing scam &#8211; this time from an university account<!--:--><!--:af-->Nog `n strikroofpoging &#8211; di\u00e9 keer vanaf `n universiteitsrekening<!--:-->"},"content":{"rendered":"<p><!--:en--><\/p>\n<p>Below is an example of an phishing scam that has been sent out seemingly by a legitimate University-based e-mail account. Unfortunately this time, the e-mail message has been sent to other institution\u2019s addresses and the university is being wrongly criticised for \u201callowing\u201d this.<\/p>\n<p>Remember: The only purpose of a phishing scam is to get victims to provide their personal information and thereby gain access and control of passwords, bank account numbers and personal details.<\/p>\n<p>Information Technology will be investigating this incident but keep this in mind:<\/p>\n<ol>\n<li>Many times an automatic program is used to \u201cspoof\u201d or forge a phony e-mail address to disguise the real sender The address is often pulled from a database of \u201cstolen addresses\u201d.<\/li>\n<li>This university e-mail account owner might be a victim themselves of a phishing scam, and have provided their details to scammers, resulting in their address or computer being \u201chijacked\u201d by the phishers.<\/li>\n<li>In some cases an e-mail address owner is employed by the phishers to operate and send out phishing mails on their behalf with the promise of earning money for their services<i>. (Earn $10\u00a0000 per month and work from home)\u00a0<\/i>in this case it is unlikely, but nevertheless a risk.<span style=\"font-size: 13px;\">\u00a0<\/span><\/li>\n<\/ol>\n<p>In the screen grab below note the \u201choneypot\u201d:<\/p>\n<p>\u2026There is no Subject line<\/p>\n<p>\u2026It seems to come from a university employee but the reply to address is some other address<\/p>\n<p>\u2026It promises that you have won a large amount of money. That always attracts people.<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-5482\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam.png\" alt=\"spam\" width=\"614\" height=\"416\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam.png 1024w, https:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam-300x203.png 300w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[ARTICLE BY DAVID WILES]<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--:--><!--:af--><\/p>\n<p>Onder is `n voorbeeld van `n nuwe strikroofpoging wat skynbaar uitgestuur is deur `n geldige Universiteit e-posadres. Ongelukkig is die e-pos boodskap ook gestuur na ander instellings se adresse en die universiteit word verkeerdelik gekritiseer omdat dit &#8220;toegelaat&#8221; is.<\/p>\n<p>Onthou: Die enigste doel van hierdie lokvalle is om slagoffers so ver te kry om hul persoonlike inligting weer te gee en sodoende toegang en beheer oor wagwoorde, bankrekeninginligting en ander details te kry.\u00a0<\/p>\n<p>Informasietegnologie ondersoek reeds di\u00e9 spesifieke insident, maar hou die volgende in gedagte:<\/p>\n<p>1. Dikwels sal `n outomatiese program gebruik word om `n onegte adres te genereer om die regte versender van die e-pos weg te steek. Die adres word gewoonlik onttrek vanuit `n databasis van &#8220;gesteelde adresse.&#8221;<br \/>2. Die universiteits e-posrekeninghouer is waarskynlik self die slagoffer van strikroof en het hul details aan kuberkriminele verskaf &#8211; wat om die beurt gelei het daartoe dat hulle adres of rekenaar ge&#8221;kaap&#8221; is deur die krininele.<br \/>3. In sommige gevalle word `n e-posadres eienaar in diens geneem deur kuberkriminele om hierdie e-posse uit te stuur met die belofte dat hulle geld sal verdien vir hul dienste.<i>\u00a0(Earn $10\u00a0000 per month and work from home). <\/i>\u00a0In hierdie geval is dit natuurlik onwaarskynlik, maar dit bly steeds `n groot risiko om te reageer op sulke aanbiedinge.<\/p>\n<p>Op die skermskoot onder, let op die weggeetekens:<\/p>\n<p>\u2026 Daar is geen &#8220;subject line&#8221;<\/p>\n<p>\u2026 Dit wil voorkom of dit van `n universiteitswerknemer gestuur is, maar die &#8220;reply to&#8221; adres is `n ander adres.\u00a0<\/p>\n<p>\u2026 Jy word belowe dat jy `n groot hoeveelheid geld gewen het. Natuurlik is dit `n groot trekpleister van die meeste mense!\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam.png\"><img loading=\"lazy\" decoding=\"async\" alt=\"spam\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2014\/02\/spam.png\" width=\"614\" height=\"416\" \/><\/a><\/p>\n<p>\u00a0<\/p>\n<p>[ARTIKEL DEUR DAVID WILES]<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/p>\n<p><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below is an example of an phishing scam that has been sent out seemingly by a legitimate University-based e-mail account. Unfortunately this time, the e-mail message has been sent to other institution\u2019s addresses and the university is being wrongly criticised for \u201callowing\u201d this. Remember: The only purpose of a phishing scam is to get victims [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1103,20382,29187],"tags":[],"class_list":["post-5481","post","type-post","status-publish","format-standard","hentry","category-communication","category-email","category-security-2"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 06:49:37","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=5481"}],"version-history":[{"count":10,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5481\/revisions"}],"predecessor-version":[{"id":9270,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5481\/revisions\/9270"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=5481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=5481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=5481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}