A phishing attack happens when someone tries to trick you into sharing personal information online.
Table of Contents
Table of Contents | ||
---|---|---|
|
What phishing is
Phishing is usually done through email, ads, or by sites that look similar to sites you already use. For example, someone who is phishing might send you an email that looks like it's from your bank so that you'll give them information about your bank account. The Sage Service Desk has encountered an increase in emails asking users to purchase gift cards. These emails appear to be from a member of the college, when in fact they are not.
...
Info |
---|
The Sage Colleges Service Desk and Google will never ask you to provide this type of information in an email. |
If you've disclosed personal information to an attacker (phisher)
Warning | ||
---|---|---|
| ||
If you have disclosed personal information (i.e. bank account number, SSN, credit card numbers, etc.) be sure to contact the institutions who own that information and let them know that you were a victim of a phishing attack. |
...
- Change your password immediately by following this guide.
- Enable 2-Step Verification for your Sage Google Account. The How-To article for this can be found here.
- Follow the steps below from the If you've received a phishing/suspicious emailsection of this article.
If you've received a phishing/suspicious email
If you've received an email you suspect to be a phishing attempt please perform the following steps.
Warning | ||
---|---|---|
| ||
Do not click on any links or respond in any capacity to the email until the Service Desk has verified if the email is legitimate. |
Create a new service request
Open a service request with the Service Desk using this link: Report Phishing/Suspicious Email
Gather detailed email information
In a new tab
- Open Gmail.
- Open the email you suspect is a phishing attempt.
- Next to Reply , click More Show original.
A new window will open and display important information regarding the suspicious email, including fields like authentication results. To provide email header information follow the directions above, and in the new window click the blue button labeled "Copy to clipboard." Then paste this information in the description box when submitting your service request. You will need to provide this information when submitting a Service Request to the Service Desk.
Report a phishing email to Google
When Gmail identifies that an email may be phishing or suspicious, it might show a warning or move the email to Spam. If an email wasn't marked correctly, follow the steps below to mark or unmark it as phishing.
...
- On a computer, go to Gmail.
- Open the message.
- Next to Reply , click More .
Note: If you're using classic Gmail,click the Down arrow . - Click Report not phishing.
Avoid phishing attacks
Be careful anytime you get an email from a site asking for personal information. If you get this type of email:
...
Info | ||
---|---|---|
| ||
Google has created a phishing quiz that helps you learn how to spot phishing emails. You can take the quiz here. |
Example of a phishing email
In the example below Alex is the target of a phishing scam by an attacker who is pretending to be Ryeley. The attacker is very convincing; they've used Ryeley's real email signature and changed the sender name to Ryeley's full name. The attackers emails are in red, and the targets emails are in blue.
Date: Wed, Mar 20, 2019 at 6:13 PM
Subject: Re[3]: Re[2]: Urgent Request
To: Alex Markessinis <alex.markessinis@sage.edu>
On Wed, Mar 20, 2019 at 5:59 PM Ryeley Kuykendall <networkadmin@my.com> wrote:
Available?
Ryeley Kuykendall,
Network Administrator
Cowee Hall, Troy Campus
The Sage Colleges
--------------------------------------------
On Wed, Mar 20, 2019 at 6:02 PM Ryeley Kuykendall <networkadmin@my.com> wrote:
I'm in a meeting right now, I ned you to help me complete a task right away from any nearest store around.
Thanks
Ryeley Kuykendall,
Network Administrator
Cowee Hall, Troy Campus
The Sage Colleges
--------------------------------------------
On Wed, Mar 20, 2019 at 6:13 PM Ryeley Kuykendall <networkadmin@my.com> wrote:
Are you receiving my emails?
Thanks
Ryeley Kuykendall,
Network Administrator
Cowee Hall, Troy Campus
The Sage Colleges
--------------------------------------------
Wednesday, 20 March 2019, 11:00 PM +0100 from Alex Markessinis <alex.markessinis@sage.edu>:
Sure? What is up?
--------------------------------------------
Wednesday, 20 March 2019, 11:03 PM +0100 from Alex Markessinis <alex.markessinis@sage.edu>:
Okay.
What do you need?
--------------------------------------------
Wednesday, 20 March 2019, 11:06 PM +0100 from Ryeley Kuykendall <networkadmin@my.com>:
Alexander,
Here is what you need to do for me real quick. I need google play gift
cards, can you get some at the store right now? Let me know to advise
denomination to purchase. I will reimburse you all expense as soon as I'm
done.
Thanks
Ryeley Kuykendall,
Network Administrator
Cowee Hall, Troy Campus
The Sage Colleges
Phishing Red Flags
We've included some red flags below that will help you identify potentially malicious emails.
1. The language, spelling, and grammar are “off.”
Is the email full of spelling errors, or does it look like someone used an online translation service to translate the mail to your language? In the email chain above the attacker phrased this message in a strange way and misspelled the word need.
I ned you to help me complete a task right away from any nearest store around.
2. The sender doesn’t seem to know the addressee.
Is the recipient name spelled out in the email, and are you being addressed as you would expect from the sender? Does the signature match how this sender would usually sign their mails to you? Your bank usually does not address you in generic ways like “Dear customer.” If the email is legit and clearly intended for you, then they will use your full name. In the email above the attacker addresses the recipient by the name Alexander, though the recipients name is actually Alex and Ryeley always refers to Alex by the name Alex.
Alexander
3. Embedded links have weird URLs.
Always hover first over the links in the email. Do not click. Does the destination URL match the destination site you would expect? Will it download a file? Are they using a link shortening service? When in doubt, if you have a shortcut to the site of the company sending you the email, use that method instead of clicking the link in the email.
4. Sender is asking for money.
Often attackers will ask for money in the form of a wire transfer or in the form of a gift cards. Attackers attempt to get money this way because these modes of money transfer are non-refundable and hard to trace. In the email above the attacker asks the sender to purchase Google Play gift cards.
I need google play gift cards
5. The sender address isn’t correct.
Check if this address matches the name of the sender and whether the domain of the company is correct. To see this, you have to make sure your email client displays the sender’s email address and not just their display name. Sometimes you need to train hawk eyes at the address, since spammers have some convincing tricks up their sleeve. In the example above the senders email is networkadmin@my.com which is not a valid sage.edu email address. We always advocate checking the email address being used to send the email rather than just looking at the senders name.
...
Column | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Related articles
Filter by label (Content by label) | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...