Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A phishing attack happens when someone tries to trick you into sharing personal information online.

Table of Contents

Table of Contents
maxLevel3

What phishing is

Phishing is usually done through email, ads, or by sites that look similar to sites you already use. For example, someone who is phishing might send you an email that looks like it's from your bank so that you'll give them information about your bank account. The Sage Service Desk has encountered an increase in emails asking users to purchase gift cards. These emails appear to be from a member of the college, when in fact they are not.

...

Info

The Sage Colleges Service Desk and Google will never ask you to provide this type of information in an email.

If you've disclosed personal information to an attacker (phisher)

Warning
titleWarning!

If you have disclosed personal information (i.e. bank account number, SSN, credit card numbers, etc.) be sure to contact the institutions who own that information and let them know that you were a victim of a phishing attack.

...

  1. Change your password immediately by following this guide.
  2. Enable 2-Step Verification for your Sage Google Account. The How-To article for this can be found here.
  3. Follow the steps below from the If you've received a phishing/suspicious emailsection of this article.

If you've received a phishing/suspicious email

If you've received an email you suspect to be a phishing attempt please perform the following steps.

Warning
titleWarning!

Do not click on any links or respond in any capacity to the email until the Service Desk has verified if the email is legitimate.

Create a new service request

Open a service request with the Service Desk using this link: Report Phishing/Suspicious Email

Gather detailed email information

In a new tab

  1. Open Gmail.
  2. Open the email you suspect is a phishing attempt.
  3. Next to Reply Reply, click More More and then Show original.

A new window will open and display important information regarding the suspicious email, including fields like authentication results. To provide email header information follow the directions above, and in the new window click the blue button labeled "Copy to clipboard." Then paste this information in the description box when submitting your service request. You will need to provide this information when submitting a Service Request to the Service Desk.

Report a phishing email to Google

When Gmail identifies that an email may be phishing or suspicious, it might show a warning or move the email to Spam. If an email wasn't marked correctly, follow the steps below to mark or unmark it as phishing.

...

  1. On a computer, go to Gmail
  2. Open the message.
  3. Next to Reply Reply, click More More.
    Note: If you're using classic Gmail,click the Down arrow Down Arrow.
  4. Click Report not phishing.

Avoid phishing attacks

Be careful anytime you get an email from a site asking for personal information. If you get this type of email:

...

Info
titleCan you spot when you’re being phished?

Google has created a phishing quiz that helps you learn how to spot phishing emails. You can take the quiz here.

Example of a phishing email

In the example below Alex is the target of a phishing scam by an attacker who is pretending to be Ryeley. The attacker is very convincing; they've used Ryeley's real email signature and changed the sender name to Ryeley's full name. The attackers emails are in red, and the targets emails are in blue.

From: Ryeley Kuykendall <networkadmin@my.com>

Date: Wed, Mar 20, 2019 at 6:13 PM

Subject: Re[3]: Re[2]: Urgent Request

To: Alex Markessinis <alex.markessinis@sage.edu>

On Wed, Mar 20, 2019 at 5:59 PM Ryeley Kuykendall <networkadmin@my.com> wrote:


Available?


Ryeley Kuykendall,

Network Administrator

Cowee Hall, Troy Campus

The Sage Colleges

--------------------------------------------

On Wed, Mar 20, 2019 at 6:02 PM Ryeley Kuykendall <networkadmin@my.com> wrote:

I'm in a meeting right now, I ned you to help me complete a task right away from any nearest store around.


Thanks


Ryeley Kuykendall,

Network Administrator

Cowee Hall, Troy Campus

The Sage Colleges

--------------------------------------------

On Wed, Mar 20, 2019 at 6:13 PM Ryeley Kuykendall <networkadmin@my.com> wrote:

Are you receiving my emails?


Thanks


Ryeley Kuykendall,

Network Administrator

Cowee Hall, Troy Campus

The Sage Colleges

--------------------------------------------

Wednesday, 20 March 2019, 11:00 PM +0100 from Alex Markessinis <alex.markessinis@sage.edu>:

Sure? What is up?

--------------------------------------------

Wednesday, 20 March 2019, 11:03 PM +0100 from Alex Markessinis <alex.markessinis@sage.edu>:

Okay.

What do you need?

--------------------------------------------

Wednesday, 20 March 2019, 11:06 PM +0100 from Ryeley Kuykendall <networkadmin@my.com>:


Alexander,

Here is what you need to do for me real quick. I need google play gift

cards, can you get some at the store right now? Let me know to advise

denomination to purchase. I will reimburse you all expense as soon as I'm

done.


Thanks


Ryeley Kuykendall,

Network Administrator

Cowee Hall, Troy Campus

The Sage Colleges

Phishing Red Flags

We've included some red flags below that will help you identify potentially malicious emails.

1. The language, spelling, and grammar are “off.”

Is the email full of spelling errors, or does it look like someone used an online translation service to translate the mail to your language? In the email chain above the attacker phrased this message in a strange way and misspelled the word need.

I ned you to help me complete a task right away from any nearest store around.

2. The sender doesn’t seem to know the addressee.

Is the recipient name spelled out in the email, and are you being addressed as you would expect from the sender? Does the signature match how this sender would usually sign their mails to you? Your bank usually does not address you in generic ways like “Dear customer.” If the email is legit and clearly intended for you, then they will use your full name. In the email above the attacker addresses the recipient by the name Alexander, though the recipients name is actually Alex and Ryeley always refers to Alex by the name Alex.

Alexander

3. Embedded links have weird URLs.

Always hover first over the links in the email. Do not click. Does the destination URL match the destination site you would expect? Will it download a file? Are they using a link shortening service? When in doubt, if you have a shortcut to the site of the company sending you the email, use that method instead of clicking the link in the email.

4. Sender is asking for money.

Often attackers will ask for money in the form of a wire transfer or in the form of a gift cards. Attackers attempt to get money this way because these modes of money transfer are non-refundable and hard to trace. In the email above the attacker asks the sender to purchase Google Play gift cards.

I need google play gift cards

5. The sender address isn’t correct.

Check if this address matches the name of the sender and whether the domain of the company is correct. To see this, you have to make sure your email client displays the sender’s email address and not just their display name. Sometimes you need to train hawk eyes at the address, since spammers have some convincing tricks up their sleeve. In the example above the senders email is networkadmin@my.com which is not a valid sage.edu email address. We always advocate checking the email address being used to send the email rather than just looking at the senders name.

...

Column


from:Jane Doe <Jane.Doe@domain.com>
to:MyFirstName MyLastName <username@sage.edu>
date:Jan 1, 1970, 12:00 AM
subject:Daily News Roundup
mailed-by:domain.com
signed-by:domain.com
security:

Standard encryption (TLS) Learn more

Important mainly because it was sent directly to you.



Related articles

Filter by label (Content by label)
showLabelsfalse
max5
spacesITKB
showSpacefalse
sortmodified
reversetrue
typepage
cqllabel in ("password","phishing","scam","spam","email","gmail") and type = "page" and space = "ITKB"
labelspassword

...