Phishing and Scams

Phishing is a form of social engineering delivered by email. Phishing scams appear to originate from a trusted source to trick you into entering your credentials, revealing personal identifying information (PII), or sending money to them.

The attacker can then use this information to access your accounts, gather additional private information about you in an attempt to steal your identity, and make purchases or apply for credit in your name.

To learn more about phishing and social engineering, read the information here.

(Click to enlarge)
Phishing Poster

 

Phishing Tips

  • Move your mouse over links in emails and it may show a different URL than the one displayed.
  • If you are encouraged to click a link that claims to lead to a legitimate site (such as Amazon), look online for a trusted URL leading to that site instead.
  • Check the sender address to verify that the email comes from an official source.
  • Check for slight mispellings - in the URL, company name, etc. For example, paypa1.com instead of paypal.com.
  • Use additional software - Many browsers have add-ons/extensions/plug-ins that can help detect phishing sites.
  • Be wary of anything that gives a sense of urgency, or states that it requires immediate action.
  • Don't click anywhere in suspicious emails—even in what may appear to be white space.
  • Be wary of too-good-to-be-true offers such as free airline tickets or vacation.
  • Don’t open attachments in unexpected or suspicious emails or instant messages.
  • Don’t send passwords, bank account numbers, or other private information in an email.

Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through email.

For more advice on how to avoid phishing scams, visit our Fight the Phish page!

Have I Been The Victim Of A Phishing Scam?

If you believe that you have been the victim of a phishing scam, change your password immediately and report it to phish@kent.edu or submit a . Also, don't forget to check out this page for tips on how to keep your accounts safe. If you are using Gmail, you can also end all other active sessions. This should stop any unauthorized access to your account. Instructions on how to do this can be found . You can also end active sessions in Outlook by following the instructions .

When a victim of a phishing scam, it's common practice for the hackers to change your signatures, forwards, filters, and other settings. If you believe you fell victim to a scam, we recommend checking the following settings in your mail client.

  • A signature for an email is text that is automatically inserted at the end of an email. It is usually something you choose to set up. Make sure it is not an unfamilar one setup.
  • Forwards can be set up to automatically forward to another email address. Make sure it is not forwarded to unknown address without your permission.
  • Inbox rules/filters can be used to automatically sort or delete anything in your inbox or sent box etc.  Scammers can use it to re-direct/hide their messages.
  • Check all of the folders in your email account - sometimes the malicious actor may create new folder to store messages they sent/receive or put them into the Trash when using your account to perform scams.

(Click to enlarge)
Don't Get Hooked Poster

What Are Scams?

Scams come in many forms and are a type of social engineering to either gain your personal identifiable information (PII), or steal your money. They are getting more and more sophisticated, particularly when it comes to targeting you online and through mobile devices. It’s important to know how to recognize a scam so you can protect yourself from fraudsters.

Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through e-mail, so be wary of anything that says otherwise.

Please report any scams you receive to phish@kent.edu. You can learn about additional ways to report phishing scams here: Report Phishing

How To Detect a Scam?

  • Scammers pretend to be from organizations you know
  • They pretend that you won a prize or that there is a problem
  • Scam calls will usually pressure you to act immediately
  • If it sounds too good to be true, then it probably is
  • Scammers will tell you to pay in a specific way

Steps To Avoid Scams

  • Don’t give out any personal information
  • Resist pressure
  • Block unwanted calls or messages
  • Don't click on any pictures, links, or white spaces in a suspicious email
  • Stop and talk to someone before taking action or giving out any information

Please refer to the site to read more about common scams and how to report them.

 

Watch Out for Phishing!

Cyber Security Awareness Month 2024 Badge

 

October is Cybersecurity Awareness Month

This year's initiative for Cybersecurity Awareness Month is "." The third week of Cybersecurity Awareness month focuses on recognizing and reporting phishing emails. Cybercriminals like to go phishing, but you don't have to take the bait!

Knowing how to recognize and report a phishing email is an important way to keep yourself and others safe online. This month's tips will focus on the red flags present in many types of phishing emails, as well as different methods of reporting these messages.

 

What is Phishing?

Phishing is a type of online scam where criminals send out fraudulent email messages that appear to come from a legitimate source. The email is designed to trick you into providing the scammer with confidential information. The email can include a link or attachment which once clicked, will steal sensitive information or infect a computer with malware. Phishing is a form of social engineering.

Many phishing messages alert you with a sense of urgency, such as an email claiming to come from a trusted source with a link for you to click. For example, this link can lead to a fraudulent website that asks you to enter sensitive information. Any information you input through it will be sent to the attacker. Depending on how much information you provided, the attacker can make purchases in your name or commit identity fraud.

 

Red Flags & Common Scams

There are several common red flags that you can look for when you receive a suspicious email. Ask yourself the following questions:

  • Does the sender's email address look unfamiliar, or not make sense given the context of the message?
  • Are you being offered something (a job, money, a gift) that seems too good to be true?
  • Does it include urgent, alarming, or threatening language?
  • Is the greeting ambiguous or generic? For example, does the email begin with "Dear customer" instead of your name?
  • Does it ask you to send personal information (phone number, banking information, social security number)?
  • Are you repeatedly directed to click a link or open an attachment?
  • Is the message unexpected or out of the ordinary?
  • Was the message sent at an unusual time of day, such as outside of work hours or overnight? For example, would your supervisor send you an email asking you to complete a task at 2 in the morning?

You can read more in-depth about red flags here!

To learn more about common phishing scams, visit our page here. Just select a scam to read more about it!

 

I Think I Found a Phish! Now What?

If you suspect that you have received a phishing email:

  • Do not click any links within the suspicious message. Clicking a link can install malware onto your system, send information about you to the scammer, or redirect you to a fraudulent website. For more on the dangers of malicious links, visit our page here.
  • Do not open any attachments. Doing so can run dangerous code and harm your system. Be especially cautious when you see files with .HTML or .EXE extensions, though many other file types can be used to deliver malware.
  • Do not respond to the message, especially if you are asked to send any personal, financial, or otherwise sensitive information. Scammers often use threats or a sense of urgency to get you to respond; slow down and think twice!

Whenever you receive a suspicious message, you can keep yourself and others safe by reporting it.

 

Reporting a Phish

Does an email in your inbox have some of the red flags listed above? If so, it is best to report the email. MŮ has a dedicated team that will analyze any emails that are reported as phish. If the email is a phish, the Phish Team will let you know how that particular scam works, what the scammer was after, and any additional actions you can take to keep yourself safe. Our team will also remove all copies of the phishing message from MŮ's mail system.

If you did reply to or interact with the content of an email, and our team reports back that it is a phish, we can provide you with some additional steps for securing your accounts and devices.

To report an email to us, just forward it to phish@kent.edu. You can also use these instructions to .

You can learn how to report messages to Microsoft, Google, or your cellular service provider here!

By reporting an email to one or all of these entities, you are helping ensure that the phishing attempt is stopped or mitigated before it can reach other people. This helps protect you, your colleagues, and everyone else online from phishing attempts!

 

More Resources

The National Cybersecurity Alliance has also created Kubikle, a series of short videos discussing various topics around keeping your accounts and data secure! You can watch the videos on YouTube .

The Cybersecurity and Infrastructure Security Agency has also created educational videos about and .

For even more advice on how to spot phishing emails, you can watch IT Governance's video on the topic .

Types of Phishing and Scams

When people refer to phishing, they are most commonly referring to phishing attempts delivered in an email. However, there are a few other types of phishing. You can read about them, as well as many different scams and techniques, by clicking a topic in the menu below: