Untitled Document

WVSOM Information Technology Phish-Bowl

This page is your source for the latest phishing attempts (email scams) being experienced by the WVSOM community. If you receive an email you believe to be suspicious or fraudulent, check the "Recent Catches" below to see if the email is a confirmed phish. 

To report a new phishing email forward the email including the headers to catchaphish@osteo.wvsom.edu. This account is actively monitored for new reports, once confirmed the email will be added to this page.

Recent "Catches"

Voice Message Received [2-07-19]

Zero Tolerance Policy [2-07-19]

Re:  Failed/Stuck Exports Update

Fw:  Order Payment Accepted Z-322957 [2-01-19]

Fw:  Update [2-01-19]

31st of January [1-31-19]

Doc0104.docx [1-10-19]

Due Invoices [11-6-18]

I did not expect to find such a wonderful thing! [11-1-18]

WVSOM STRATEGIC PLAN [10-26-18]

Below is a short list of common giveaways of phishing emails, if you would like to learn more about what makes a phish a phish visit our Anatomy of a Phish page for more information.

Common Signs of  Phishing Attempts:

  • Do you recognize the sender? Does the email address match the name of the supposed sender? Sometimes attackers will use a name that's familiar to you but the email address is something completely different. When in doubt, call or text the sender about an email you are unsure of.
  • Are you named in the salutation or is it a generic "Dear User/Customer"? Attackers usually send messages out in mass with a one-size-fits-all greeting. If a trusted institution was trying to contact you they should know your name.
  • Are there spelling errors or instances of poor grammar? Many of these attacks originate abroad and are often perpetrated by cyber criminals that have poor use of the English language.
  • Does the subject and/or message body convey a sense of urgency or require immediate attention i.e. "Account Deletion Imminent"? Oftentimes, attackers will prey on your fears in order to make you rush to act quickly. Usually, if it's as dire as they say, the organization would probably reach out to you over multiple means of communication and should never ask for personal information (passwords, SSN, etc.) via email.
  • If it appears too good to be true, it probably is. You cannot win the Public Cleaninghouse Lottery if you've never played.
  • Be wary of links in suspicious emails. Attackers can make links appear different than where they actually lead. For example, this link looks like it would take you to Google: https://www.google.com but this link actually leads to our homepage. Hovering over the link should tell you the actual destination in either the lower left or right corner of your browser.
  • Be careful of attachments. You should only open attachments you are expecting. Sometimes attackers will hide malware inside files that are named to be deceivingly tempting such as "Employee W2s". Remember, curiosity killed the cat.