Posts written by soukupg

Available

March 28, 2024

This email attempts to impersonate a legitimate employee by using a real employee name, but originates from a suspicious external domain. There are many variation of this email utilizing different employee names. It is likely that the attacker is using publicly available directory information to target employees within a department by using a familiar name. […]


Document from HP LaserJet Pro Scanner

March 26, 2024

This email attempts to impersonate a notification from HP alerting the recipient that they have received a scanned document. The word document contained in the email contains a link to a website which attempts to impersonate hp.com. The URL was found to contain malware. Below are the red flags: Suspicious Attachment: Attachments are the most […]


Asset Works: User Password Expiration – Reminder

March 7, 2024

This email originates from awsupport@assetworks.com, which is a legitimate Asset Works account. Asset Works is software development company whose products are used by UT Health San Antonio for fleet vehicles and the gas needed for them. However, due to the suspicious nature and recent proliferation of these emails to various faculty outside the fleet vehicle […]


Thanks fọr pļacíng Ọrder (Geek Squad)

February 29, 2024

This phishing email uses a common tactic of impersonating a Geek Squad invoice for a considerable charge. The tactics employed are designed to trick the recipient into calling the provided help desk number and disclosing financial information to the scammers. This particular example contains suspicious characters in the heading. Below are the red flags: Suspicious […]


helpdesk helpdesk (Norton AV Scam)

February 27, 2024

This email attempts to deceive the user into believing that they have received a bill for a substantial amount of money for the renewal of Norton products. The objective of this email is to trick the recipient into calling the provided phone number and revealing personal and financial information to the scammers. Here are the […]


modification of direct deposit details

February 27, 2024

This is a common phishing email which impersonates a legitimate employee in an attempt to redirect direct deposit payments to the attacker. below are the red flags: Mismatch Email: The email does not match the name of the sender, and is sent from an external account. Request for Sensitive Action: The sender is attempting to […]


2024 CPE Provider List Information Verification

February 13, 2024

This phishing email is intended to impersonate the Texas Education Agency and direct users to a malicious link to harvest credentials. Below are the red flags: Sender’s Email Address: The email comes from an ‘icloud.com’ domain, which is unusual for official communication from an organization like the Texas Education Agency. Official emails would typically come […]


(ADVANCE) WARNING!!!

February 8, 2024

This phishing email is intended to redirect users to a Google form that will harvest their credentials and allow the attackers to bypass two factor authentication. This email is particularly dangerous because if successful, attackers will be able to gain network level access through the use of the stolen two factor authentication code. Below are […]


Kindly review changes and amendments in Uthscsa policy

January 25, 2024

This phishing email attempts to impersonate UTHSCSA HR department and direct employees to review a policy update through a QR code. The QR Code redirects to a known Russian based phishing campaign site. The key red flags are as follows: External Sender Address: The email claims to be from UTHSCSA HR but is sent from […]


uthscsa.edu TODAY

January 23, 2024

This email is an example of an attempt to harvest logon credentials by impersonating the UTHSCSA Support desk and prompting users to logon to the malicious link. The key red flags are the following: External Sender Address: The email comes from an external domain with to relation to UT Health. This is a major red […]