{"id":8382,"date":"2015-08-26T09:55:56","date_gmt":"2015-08-26T07:55:56","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=8382"},"modified":"2016-01-18T14:45:13","modified_gmt":"2016-01-18T12:45:13","slug":"phishing-scam-with-malware-infected-attachment","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2015\/08\/phishing-scam-with-malware-infected-attachment\/","title":{"rendered":"<!--:en-->New html phishing scam <!--:--><!--:af-->Nuwe html &#8220;phishing&#8221; <!--:-->"},"content":{"rendered":"<p><!--:en--><\/p>\n<p>There are a number of e-mails arriving in student and personnel accounts that have malware\/virus infected attachments, usually *disguised* as .html files.<\/p>\n<p>The e-mails have subject lines like \u201cUCount reward confirmation\u201d and \u201cConfirmation of epayment\u201d and have .html attachments. \u00a0After clicking the link on the webpage that appear, you will be sent to a fraudulent site, which looks just like the institution&#8217;s web site and you will be asked for various sensitive information. Although the Trojan attachment does not install anything into the system, it utilizes the &#8220;social engineering&#8221; technique to force users fill in their personal data on a fraudulent web site.<\/p>\n<ul>\n<li>Always beware when asked for private information.<\/li>\n<li>Do not click on links in e-mail and do not copy-paste them into your browser.<\/li>\n<li>Open a new browser window and type in the company&#8217;s correct address.<\/li>\n<li>Make sure such requests are genuine by, for example, calling a known company&#8217;s phone number.<\/li>\n<li>Do not send sensitive information by e-mail. Legitimate companies do not ask you to send important data by e-mail.<\/li>\n<\/ul>\n<p>Be careful out there. The reason why scammers are so successful is because they catch people regularly!<\/p>\n<p style=\"text-align: right;\">[ARTICLE BY DAVID WILES]<\/p>\n<p><!--:--><!--:af--><\/p>\n<p>Op die oomblik ontvang heelwat studente- en personeelrekeninge e-pos met &#8220;malware&#8221; of virusbesmette aanhangsels, gewoonlik *versteek* as .html le\u00ears.<\/p>\n<p>Die e-posse se onderwerpe sluit onderwerptitels in soos\u00a0\u201cUCount reward confirmation\u201d en\u00a0\u201cConfirmation of epayment\u201d. Daarmee saam word `n .html dokument gestuur.\u00a0<\/p>\n<p>Nadat jy op die skakel op die webblad (.html dokument) gekliek het, sal jy herlei word na `n vals webwerf. Die webwerf sal wel lyk soos die instelling se webwerf, maar dis bloot `n kopie. Die webwerf sal, onder andere, persoonlike en vetroulike inligting van jou vra.<\/p>\n<p>Alhoewel die <em>Trojan<\/em>-aanhangsel nie enigiets op jou rekenaar installeer nie, gebruik dit `n sosiaal-gefabriseerde tegniek om gebruikers te dwing om persoonlike inligting op `n valse webwerf in te voer.\u00a0<\/p>\n<ul>\n<li>Wees altyd versigtig wanneer privaatinligting gevra word.<\/li>\n<li>Moenie kliek op skakels in e-posse nie en moet dit nie kopieer en plak in jou webblaaier nie.\u00a0<\/li>\n<li>Maak `n nuwe blaaier-oortjie oop en tik die betrokke maatskappy se regte adres in.\u00a0<\/li>\n<li>Maak seker die versoeke is wettig deur, byvoorbeeld, die maatskappy se telefoonnommer te skakel.<\/li>\n<li>Moenie sensitiewe informasie met e-pos stuur nie. Wettige maatskappy sal nie vra dat jy data per e-pos aan hulle versend nie.\u00a0<\/li>\n<\/ul>\n<p>Wees versigtig daar buite. Kubermisdadigers is so suksesvol omdat hulle so gereeld mense uitvang!<\/p>\n<p style=\"text-align: right;\">[ARTIKEL DEUR DAVID WILES]<\/p>\n<\/p>\n<p><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a number of e-mails arriving in student and personnel accounts that have malware\/virus infected attachments, usually *disguised* as .html files. The e-mails have subject lines like \u201cUCount reward confirmation\u201d and \u201cConfirmation of epayment\u201d and have .html attachments. \u00a0After clicking the link on the webpage that appear, you will be sent to a fraudulent [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[],"class_list":["post-8382","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 19:50:01","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/8382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=8382"}],"version-history":[{"count":6,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/8382\/revisions"}],"predecessor-version":[{"id":9207,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/8382\/revisions\/9207"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=8382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=8382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=8382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}