The responses in the following thread should look familiar to frequent visitors of the Phish Bowl and offer an opportunity to see how the scam progresses.
From: Christina Hull Paxson <email@example.com>
Date: Tue, Jan 15, 2019 at 7:56 AM
Subject: Hi are you there
From: Patrick Heller <firstname.lastname@example.org>
Date: Sat, Jan 12, 2019 at 5:35 PM
Subject: Re: Hello
From: Anthony Cokes <email@example.com>
Date: Mon, Jan 14, 2019 at 5:39 PM
From: "Paul G. Williard" <firstname.lastname@example.org>
Date: January 14, 2019 at 11:31:26 PM
From: Richard Rambuss <email@example.com>
Date: Tue, Jan 8, 2019 at 5:36 PM
The following is an example of a legitimate Google security notification, warning the recipient of suspicious activity occurring with their account.
Another variation on the "malware sextortion" scam, with this one including an old password in the receiver's address.
From: Thomas A.lewis <firstname.lastname@example.org>
Subject: Happy holidays and Happy New Year?
From: Christina Paxson <email@example.com>
Date: December 21, 2018 at 6:08:39 AM EST
While not reported here at Brown, other institutions that include universities * have been inundated with emails about phony bomb threats, in which the sender requests a sizab
The following brief email, reported by one of the people blindcopied on it, is most probably the first step in a phishing scam to hook those not paying attention to the header details.
Look out for job offers, like the following, that appear too good to be true (they usually are).
From: Kevin McLaughlin <firstname.lastname@example.org>
Date: Wed, Nov 28, 2018 at 6:34 PM
The following alert, supposedly from Facebook, was reported today, providing a number of clues to its inauthenticity. Here are a few, can you spot any others?
From: Mark Spencer (via Google Drive) <email@example.com>
Date: Fri, Nov 16, 2018 at 11:20 AM
Sent: Thursday, November 15, 2018 3:36 PM
The ever popular "Are you available" phishing scam has been reported with a new twist: not only using a familiar Brown name and email address (though rendered improperly, see below) but also their picture.*
The Malware Sextortion Scam lives on in newly-reported phishing emails that threaten to send "crazy images from your dark secret life" and block your system if you do not reply within 48 hours.
The following spoofed email -- targeting some at Brown with the request "to do something for me a ASAP" -- tries to trick the recipient into thinking it is from someone they know.
The "Chinese Consulate" call is back (see 9/10 Phish Bowl post), with the same repeated message in Mandarin but with new numbers and differen
Be on the lookout for a scam that first appeared back in the 70's -- dubbed "phoner toner" -- which was recently reported here at Brown.
Phishing tip: Make sure the email sender's address passes the "domain test".
From: Amazon <firstname.lastname@example.org>
Date: Tue, Oct 30, 2018 at 6:19 PM
Subject: Amazon Account Suspened
From: Jane Pisasale via Adobe Document Cloud <email@example.com>
Date: Tue, Oct 30, 2018 at 7:50 AM
Subject: Executed Contract
We continue to receive reports of emails that threaten to send videos of their victims to their contacts unless the victims send them hundreds of dollars in bitcoins within 48 hours.
From: Gregory Fletcher <Gregory.Fletcher@ocsarts.net>
Date: Mon, Oct 15, 2018 at 12:26 PM
Subject: Re: ACH payment
From: Jana Doe <firstname.lastname@example.org>
Date: Mon, Oct 15, 2018 at 8:10 AM
From: Doug Thomson <email@example.com>
Date: Fri, Sep 28, 2018 at 5:54 PM
Subject: Re: Meeting on Tuesday
Another scam hitting University phones to avoid: a robocall that warns your account has been suspended and you need to respond to the call for your account to be reactivated.