- Accounts & Access
- Business Applications
- Computers & Software
- Email & Calendar
- Help & Support
- IT Security
- Network & Telecom
- Web Services
Info & Resources:
6/7/17: Circulation of a New Phishing Email
June 7, 2017 7:14 PM
A new phishing email is circulating the George Mason University community. This is a copy of the latest phishing email. If you get this message, DO NOT reply, DO NOT click any links, and DO NOT provide any personal information. Delete the bogus email. We never ask for this information via email. The Email Group is working on the list of who received the email and is closing the accounts of those who responded to it.
THE PHISHING EMAIL LOOKS LIKE THIS:
From: University of Southern California <polomaua AT metodista DOT br>
Date: June 7, 2017 at 7:14:21 PM EDT
Subject: Important message from: SCU Email Administrator.
Our record indicates that you recently made a request to deactivate your email address, and this request will be processed shortly.
If this request was made accidentally and you have no knowledge of it, you are advised to cancel the request below.
Cancel Deactivation Request now. *link removed*
However, if you do not take any action, your account will be deactivated as request and all your email data will be lost permanently.
University of Southern Califonia
This message is auto-generated from E-mail security server to %email.%, any replies sent to this email can not be delivered.
BE AWARE: Messages of this type are malicious phishing* attacks. Do not respond. If you have responded contact the ITS Support Center at 703-993-8870 or via email at firstname.lastname@example.org.
*Phishing is a term used by hackers who imitate legitimate companies and organizations in emails to entice users to share passwords, Social Security numbers, credit card or bank account numbers.
The Federal Trade Commission warns that victims of phishing can become victims of identity theft and offers tips on how to avoid it at www.ftc.gov/bcp/edu/microsites/idtheft/index.html.
For additional information regarding the outage, please view the After Action Report.