Search Results for "phish bowl"

Document from HP LaserJet Pro Scanner

This email attempts to impersonate a notification from HP alerting the recipient that they have received a scanned document. The word document contained in the email contains a link to a website which attempts to impersonate hp.com. The URL was found to contain malware. Below are the red flags: Suspicious Attachment: Attachments are the most […]

Read more

Asset Works: User Password Expiration – Reminder

This email originates from awsupport@assetworks.com, which is a legitimate Asset Works account. Asset Works is software development company whose products are used by UT Health San Antonio for fleet vehicles and the gas needed for them. However, due to the suspicious nature and recent proliferation of these emails to various faculty outside the fleet vehicle […]

Read more

bugs in your site

This is a new type of Phish where the person is offering up their services to help identify some vulnerabilities. They are hoping you will pay them for the information they give you. If not, they are counting on you feeling like they will exploit the vulnerabilities if you don’t pay. There are actually some […]

Read more

Thanks fọr pļacíng Ọrder (Geek Squad)

This phishing email uses a common tactic of impersonating a Geek Squad invoice for a considerable charge. The tactics employed are designed to trick the recipient into calling the provided help desk number and disclosing financial information to the scammers. This particular example contains suspicious characters in the heading. Below are the red flags: Suspicious […]

Read more

helpdesk helpdesk (Norton AV Scam)

This email attempts to deceive the user into believing that they have received a bill for a substantial amount of money for the renewal of Norton products. The objective of this email is to trick the recipient into calling the provided phone number and revealing personal and financial information to the scammers. Here are the […]

Read more

modification of direct deposit details

This is a common phishing email which impersonates a legitimate employee in an attempt to redirect direct deposit payments to the attacker. below are the red flags: Mismatch Email: The email does not match the name of the sender, and is sent from an external account. Request for Sensitive Action: The sender is attempting to […]

Read more

2024 CPE Provider List Information Verification

This phishing email is intended to impersonate the Texas Education Agency and direct users to a malicious link to harvest credentials. Below are the red flags: Sender’s Email Address: The email comes from an ‘icloud.com’ domain, which is unusual for official communication from an organization like the Texas Education Agency. Official emails would typically come […]

Read more

(ADVANCE) WARNING!!!

This phishing email is intended to redirect users to a Google form that will harvest their credentials and allow the attackers to bypass two factor authentication. This email is particularly dangerous because if successful, attackers will be able to gain network level access through the use of the stolen two factor authentication code. Below are […]

Read more

Apply Now

A quick browser search using the domain name iconpln.co.id and Red Cross shows a number of companies/universities reporting this phish. The Red Cross uses their own domain name for correspondence; their email address format is FirstName.LastName@redcross.org. Any email coming from the Red Cross would be using that format with redcross.org. The link points to arc-careers.com. […]

Read more

Kindly review changes and amendments in Uthscsa policy

This phishing email attempts to impersonate UTHSCSA HR department and direct employees to review a policy update through a QR code. The QR Code redirects to a known Russian based phishing campaign site. The key red flags are as follows: External Sender Address: The email claims to be from UTHSCSA HR but is sent from […]

Read more