{"id":9921,"date":"2016-02-29T09:07:39","date_gmt":"2016-02-29T07:07:39","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9921"},"modified":"2016-03-16T15:26:44","modified_gmt":"2016-03-16T13:26:44","slug":"phishing-scammers-at-it-again","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/02\/phishing-scammers-at-it-again\/","title":{"rendered":"[:en]E-mail account hijacked[:af]E-pos rekening gekaap[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>The phishing scammers are at it again. The mail below is &#8220;spoofing&#8221; a university account, or they are using an e-mail account that they have hijacked to send out mail to fool Stellenbosch users into divulging their personal e-mail addresses, account names and passwords. Do no respond to it or go to the site in the mail.\u00a0<\/p>\n<p>Here is the example of the mail that several SU users have already received:<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em><strong>From:<\/strong>\u00a0SU staff member &lt;sunstaffmemberaddress@sun.ac.za&gt; <\/em><br \/> <em> <strong>Sent:<\/strong> Saturday, February 27, 2016 10:05 AM<\/em><br \/> <em> <strong>To:<\/strong> &#8216;dummyaddress@mail.com&#8217;<\/em><br \/> <em> <strong>Subject:<\/strong> Dear Stellenbosch account users.<\/em><\/p>\n<p><em>Dear Stellenbosch account users.<\/em><\/p>\n<p><em>You have exceeded your sun.ac.za e-mail account limit quota of 575MB and you are requested to expand it within 48 hours or else your sun.ac.za e-mail account will be disable from our database. Simply\u00a0<strong><u>CLICK<\/u><\/strong> with the complete information requested to expand your sun.ac.za e-mail account quota to 1000MB.<\/em><\/p>\n<p><em>Thank you for using Stellenbosch University Webmail.<\/em><\/p>\n<p><em>Copyright \u00a9 2016 Webmaster Center.<\/em><\/p>\n<p style=\"text-align: right;\">[INFORMATION SUPPLIED BY DAVID WILES]<\/p>\n<p>[:af]<\/p>\n<p>Die <em>phishing<\/em> skelms is alweer bedrywig. Die e-pos onder vervals\u00a0`n universiteit e-posadres of gebruik `n e-posadres wat hulle gekaap het om e-pos aan Stellenbosch-gebruikers te stuur. Die e-pos mislei en oortuig die leser om sy persoonlike e-posadresse, rekeningname en wagwoorde bekend te maak.<\/p>\n<p>Moenie daarop reageer nie en moenie na die webwerf in die e-pos gaan nie.\u00a0<\/p>\n<p>Hier is die voorbeeld van die e-pos wat vele US-gebruikers reeds ontvang het:\u00a0\u00a0<\/p>\n<hr \/>\n<p><em><strong>From:<\/strong>\u00a0SU staff member &lt;sunstaffmemberaddress@sun.ac.za&gt; <\/em><br \/><em><strong>Sent:<\/strong> Saturday, February 27, 2016 10:05 AM<\/em><br \/><em><strong>To:<\/strong> &#8216;dummyaddress@mail.com&#8217;<\/em><br \/><em><strong>Subject:<\/strong> Dear Stellenbosch account users.<\/em><\/p>\n<p><em>Dear Stellenbosch account users.<\/em><\/p>\n<p><em>You have exceeded your sun.ac.za e-mail account limit quota of 575MB and you are requested to expand it within 48 hours or else your sun.ac.za e-mail account will be disable from our database. Simply\u00a0<strong><u>CLICK<\/u><\/strong> with the complete information requested to expand your sun.ac.za e-mail account quota to 1000MB.<\/em><\/p>\n<p><em>Thank you for using Stellenbosch University Webmail.<\/em><\/p>\n<p><em>Copyright \u00a9 2016 Webmaster Center.<\/em><\/p>\n<p style=\"text-align: right;\">[INLIGTING VERSKAF DEUR BY DAVID WILES]<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] The phishing scammers are at it again. The mail below is &#8220;spoofing&#8221; a university account, or they are using an e-mail account that they have hijacked to send out mail to fool Stellenbosch users into divulging their personal e-mail addresses, account names and passwords. Do no respond to it or go to the site [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[48701,20381],"class_list":["post-9921","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-hijacked","tag-phishing"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 09:39:09","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9921"}],"version-history":[{"count":9,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9921\/revisions"}],"predecessor-version":[{"id":9937,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9921\/revisions\/9937"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}