Uncategorized
Thanks fọr pļacíng Ọrder (Geek Squad)
February 29, 2024
This phishing email uses a common tactic of impersonating a Geek Squad invoice for a considerable charge. The tactics employed are designed to trick the recipient into calling the provided help desk number and disclosing financial information to the scammers. This particular example contains suspicious characters in the heading. Below are the red flags: Suspicious […]
helpdesk helpdesk (Norton AV Scam)
February 27, 2024
This email attempts to deceive the user into believing that they have received a bill for a substantial amount of money for the renewal of Norton products. The objective of this email is to trick the recipient into calling the provided phone number and revealing personal and financial information to the scammers. Here are the […]
modification of direct deposit details
February 27, 2024
This is a common phishing email which impersonates a legitimate employee in an attempt to redirect direct deposit payments to the attacker. below are the red flags: Mismatch Email: The email does not match the name of the sender, and is sent from an external account. Request for Sensitive Action: The sender is attempting to […]
2024 CPE Provider List Information Verification
February 13, 2024
This phishing email is intended to impersonate the Texas Education Agency and direct users to a malicious link to harvest credentials. Below are the red flags: Sender’s Email Address: The email comes from an ‘icloud.com’ domain, which is unusual for official communication from an organization like the Texas Education Agency. Official emails would typically come […]
(ADVANCE) WARNING!!!
February 8, 2024
This phishing email is intended to redirect users to a Google form that will harvest their credentials and allow the attackers to bypass two factor authentication. This email is particularly dangerous because if successful, attackers will be able to gain network level access through the use of the stolen two factor authentication code. Below are […]
Apply Now
February 2, 2024
A quick browser search using the domain name iconpln.co.id and Red Cross shows a number of companies/universities reporting this phish. The Red Cross uses their own domain name for correspondence; their email address format is FirstName.LastName@redcross.org. Any email coming from the Red Cross would be using that format with redcross.org. The link points to arc-careers.com. […]
Kindly review changes and amendments in Uthscsa policy
January 25, 2024
This phishing email attempts to impersonate UTHSCSA HR department and direct employees to review a policy update through a QR code. The QR Code redirects to a known Russian based phishing campaign site. The key red flags are as follows: External Sender Address: The email claims to be from UTHSCSA HR but is sent from […]
uthscsa.edu TODAY
January 23, 2024
This email is an example of an attempt to harvest logon credentials by impersonating the UTHSCSA Support desk and prompting users to logon to the malicious link. The key red flags are the following: External Sender Address: The email comes from an external domain with to relation to UT Health. This is a major red […]
Office 365 Expires Today
January 18, 2024
This email is a phishing attempt posing as an Office 365 expiration alert that uses urgency to prompt immediate action. The sender’s address and mismatched domain aim to deceive the recipient, while a conspicuous call-to-action button seeks to harvest credentials. Grammatical errors and external email warnings are telltale signs of its illegitimate nature. Below are […]
ndcourts.gov
January 12, 2024
This email serves as a perfect example of the use of compromised or spoofed domains. The email appears to come from a legitimate .gov domain (ndcourts.gov). Government domains, such as .gov, inherently carry a sense of authority and trustworthiness. Users are more likely to believe the authenticity of an email sent from a .gov address, […]