Category Archives: Phishing← Older posts
Many people received multiple copies of the following phish. They came from multiple source email addresses. There are many signs that the message was illegitimate. The senders are non-USC addresses and were most probably compromised accounts since it does not … Continue reading
Another over-quota phish. We do not delete accounts that are over quota. And they did not even bother to change the text of their phish from their previous victim site, East Tennessee State University.
Another your-email-will-be-disabled-unless phish. Sent from a compromised account at another institution. The link goes to an obviously unrelated site. Typo in Subject.
Phishers used a compromised faculty account to send Phish 2013-05-08 #1 to other USC addresses. They managed to send about 100 before we detected and blocked it. Phishers often use this technique because it bypasses blocks of external sites and … Continue reading
Another phish sent to around 100 people this morning. We were only forwarded the body of the phish so we do not have full headers. Mail logs show that the claimed sender was MaryJane.Hahner.firstname.lastname@example.org. They put some effort into this because … Continue reading
Many people received the following phish this morning: There are many signs that the message was illegitimate. The basic premise, used by many phish, is flawed. Users never need to “upgrade their email account”. email/webmail ugprades occur on the server. … Continue reading
Many people received the following phish this morning: There are several signs that it was a phish instead of a legitimate message from JP Morgan Chase. The message came from “email@example.com”. It was not directly addressed to you as a … Continue reading
Many people received the following phish this morning. If you hover over the link, you will see that what looks like a USC URL is actually a link to a site in Slovakia (.sk). The usc.edu.htm target page tells us … Continue reading
Many phishing scams attempt to obtain your personal information by providing links to sites that look legitimate but are, in reality, spoofed pages designed to capture your credentials or load malware onto your machine. Such messages often use a technique called URL redirection, which involves … Continue reading
Phishing involves tricking unsuspecting users into revealing personal information, such as login names, passwords, or credit card numbers, usually by sending fraudulent email messages that appear to come from legitimate sources. If you receive an email asking you to confirm … Continue reading