- Accounts & Access
- Business Applications
- Computers & Software
- Email & Calendar
- Help & Support
- IT Security
- Network & Telecom
- Web Services
Info & Resources:
5/18/17: Circulation of a New Phishing Email
May 18, 2017 2:51 PM
A new phishing email is circulating the George Mason University community. This is a copy of the latest phishing email. If you get this message, DO NOT reply, DO NOT click any links, and DO NOT provide any personal information. Delete the bogus email. We never ask for this information via email. The Email Group is working on the list of who received the email and is closing the accounts of those who responded to it.
THE PHISHING EMAIL LOOKS LIKE THIS:
Date: May 18, 2017 at 1:38:45 PM EDT
To: "Frauenthal, Brian" <Brian.Frauenthal@sdcounty.ca.gov>
Subject: RE: Action required, All Staffs and Students.
You have received a secure message
Read your secure message by opening the attachment, [*link removed*]. You will be prompted to open (view) the file or save (download) it to your computer. For best results, save the file first, then open it in a Web browser. To access from a mobile device, forward this message to [*address removed*] to receive a mobile login URL.
First time users - will need to register after opening the attachment. For more information, click the following Help link.
Help - [*link removed*]
About Cisco Registered Email Service - [*link removed*]
BE AWARE: Messages of this type are malicious phishing* attacks. Do not respond. If you have responded contact the ITS Support Center at 703-993-8870 or via email at firstname.lastname@example.org.
*Phishing is a term used by hackers who imitate legitimate companies and organizations in emails to entice users to share passwords, Social Security numbers, credit card or bank account numbers.
The Federal Trade Commission warns that victims of phishing can become victims of identity theft and offers tips on how to avoid it at www.ftc.gov/bcp/edu/microsites/idtheft/index.html.
For additional information regarding the outage, please view the After Action Report.