Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Phishing emails can take various forms and the scammers are always evolving their methods. However, below are some examples of common phishing schemes.

Type

What does it look like?

What is it trying to do?

“CEO Fraud”

The scammer pretends to be your boss or a VP or other high-ranking individual. 

---

The first email may not include any links or attachments. It will just say “I need a favor” or “are you at your desk?” 

---

It will likely include a statement about the sender being unavailable, such as “I’m in a very important meeting” or “I’m about to board a plane.” 

You are more likely to respond quickly and without much scrutiny to a name you know of a person in a position of authority. 

--- 

They are trying to engage you. After a reply or two, they will ask you to perform an action for them: buy gift cards, initiate a wire transfer, or forward sensitive documents (W-2s, health records, etc). 

---

They want to discourage you from double checking the request via phone call. 

Business Email Compromise (BEC)

Likely will appear to come from an acquaintance or non-Geneseo colleague.

---

Often has a subject like “____ would like to share a document with you.” 

---

May look like a legitimate OneDrive, DropBox, or Google Drive email or may have a pdf attachment.

You are more likely to trust an email from a familiar name.

---

The sender may be someone you have exchanged documents with in the past and the scammer is trying to exploit that relationship.

---

The shared document or pdf will usually contain a link to a web site requesting you to log in to view the document. This web site is designed to steal your password. 

IT Spoof

The scammer will pretend to represent CIT, Google, or Microsoft Support. 

---

They will use words like “urgent,” “alert,” or “compromise” to get your attention.

--- 

It will likely make reference to your email account or voice mail box.

You are less likely to question technology-focused requests coming from IT support.

---

They want you to panic and act quickly. They want you to comply with their request without taking the time to double-check the email. 

---

They will say that your mailbox is almost full or your password was in a recent data leak or you need an upgrade. They make statements that are often difficult to verify without help from IT. 

How do I determine if an email is suspicious?

...

Should I use “report spam” or “report phishing?”

...

Note

If you are unsure as to which report function is most appropriate, use "report spam."

Use report spam, if the email is:

...

  • Impersonating a college official

  • Referencing an unexpected shared document

  • Wanting you to click a link to verify your account

  • Using urgent language to prompt you to open an attachment or click a link

...

If

...

the “report phishing” option is not available, such as on a mobile device, please use “report spam” for all types of suspicious emails.

I think I made a mistake! What do I do?

If you clicked on a phishing email before realizing it was dangerous, don’t panic! 

...

Page Properties
hiddentrue

Owner (area)

Security

Reviewed by

Valerie Smith

Review Date