Phishing

PHISHING EXAMPLE: Attention: website.berkeley.edu DMCA Copyright Infringement Notice

August 18, 2021
Hello! My name is Shafaq. Your website or a website that your company hosts is infringing on a copyright-protected images owned by myself. Take a look at this document with the links to my images you used at website.berkeley.edu and my earlier publications to get the evidence of my copyrights. Download it right now and check this out for yourself: hxxps://sites.google.com/view/a0hf49gj29g-i4jb48n5/drive/folders/shared/1/download?ID=308682351554855915 I believe you have willfully infringed my rights under 17 U.S.C. Section 101 et seq. and could be liable for statutory damages as high as $150,000 as set forth in Section 504(c)(2) of the Digital Millennium Copyright Act (”DMCA”) therein.

PHISHING EXAMPLE: WORK AFTER CLASSES OFFER ($500 WEEKLY SALARY)

September 10, 2021
Hello, Are you currently in the US? Here is an opportunity for you to work part time after classes and earn $500 weekly. The job is completely done online and can be completed anytime in the evening/night at home and won't take much of your time daily, you don't have to be online all day and don't need any professional skill to do the job, all you need is just come online before going to bed to forward all order of the day made by agents to the supplier and you are done for the day.

PHISHING EXAMPLE: student email directly

September 10, 2021
Hi Student, I am Dr Ralph Abraham, I feel comfortable discussing this WORK- STUDY opening with you since you were referred by the university chamber of commerce. I am very busy, that is why I have asked for your help as my temporary personal assistant. I provide individual and group therapy, coaching, assessment and many University students with academic difficulties and no prior diagnosis are seen and assessed through the academic screening and assessment process.

Scammers are Exploiting Coronavirus Fears to Phish Users

March 9, 2020
Attackers have been sending emails that feed on concerns about COVID-19 to spread malware, trick them into sharing account credentials, or opening malicious attachments.

Phishing Example: RE: Notice from @rescue.org

March 14, 2016
A phishing message purporting to be from the International Rescue Committee regarding IT maintenance has been circulating on campus. The message requests that the recipient upgrade their mailbox size by selecting a link that redirects to a malicious website.

Scammers Exploit California’s COVID-19 Contact Tracing Program

July 15, 2020
In ongoing efforts to mitigate the spread of COVID-19, Gov. Newsom launched "California Connected, " the state's contract tracing program and public awareness campaign. Malicious actors are leveraging the program to use phishing scams to exploit the public.

What is Phishing?

Phishing is a type of attack carried out in order to steal information or money. Phishing attacks can occur through email, phone calls, texts, instant messaging, or social media. Attackers are after your personal information: usernames, passwords, credit card information, Social Security numbers. However, they are also after intellectual property, research data, and institutional information. Phishing scams can have several goals, including:

Stealing from victims - modifying direct deposit information, draining bank accounts...

Let's Get Ready to Report Phish!

Are you ready to rumble?

When you report phishing attacks, the information you send via bMail helps Berkeley fight the attackers. When enough users report an email as a phishing attack our mail systems prevent these nefarious senders from reaching more users on campus. By reporting, you are protecting your fellow Bears. Reporting through Google is quickest way to protect colleagues and campus community from attacks.


How to report:

Using the bMail web interface:

Open the message To the right of 'Reply' arrow...

Get in the Ring

Join the Fight

Knowing how to dodge a phishing attack is essential, but launching the correct counter attack is just as important. Make sure to report suspected phishing attacks so that we can remove their threat. Even if the email has official logos or links to a legitimate website, it could still be fraudulent.

If you suspect a message is not valid, call the individual or office that supposedly sent the email to confirm that it's a real request.

Do not click onlinks within an email that...

Keep Your Guard Up

SUBJECT: URGENT!!

Emails that create urgency and fear are usually fake. Scammers may insist that immediate action is necessary and pretend to be a friend, colleague, or another trusted entity. Don't let these tactics trick you into letting down your guard; stay calm and read the email carefully.

Phishing attacks can also occur through phone calls, texts, or instant messaging, so be aware of these other methods. It's important to be vigilant at all times and remain suspicious of sources that ask you for credentials and other...