Phish Bowl

Report suspicious emails to phishing@lse.ac.uk

The DTS Cyber Security team receives many reports of phishing. Fortunately, many users correctly identify phishing & don't take the bait! This bowl is full of real phishing examples reported at our School. Swim back soon - we regularly find new species of fish!

nemo-koi-hmpk-betta-g2ae49c633_1920

QR Code Phishing

QR code phishing emails are trying to compromise your LSE login credentials.  Typically, they show a QR code (redacted in the following examples) for you to scan with your phone, and after asking you to input your LSE password, they will attempt to bypass your MFA. 

Read more detailed advice in our blog article here

Screenshot 2023-09-26 at 10.07.22

Screenshot 2023-09-26 at 10.08.12

Screenshot 2023-09-26 at 10.09.13

Email: Important Task

Recently, there has been a notable uptick in emails purporting to be an LSE staff member, contacting other LSE staff in their department/division. The sender is usually a Gmail, iCloud, or other generic email address, not the real @lse.ac.uk of the person being "spoofed" or impersonated.

The subject line varies, we have seen reported examples of "Important Task", "Waiting for your quick reply", "Hi", and "URGENT!!!"

These types of phishing emails are mainly financially motivated - the bad actor wants you to purchase a gift card, worth hundreds of £, and send them the code on the back of the card to redeem. 

If you provide your phone number, you will likely be targetted by future phishing campaigns as a potentially suseptible target. If you share your phone number, we strongly recommend removing it as an MFA method for your LSE account. 

If you are "spoofed" - meaning a phishing email is circulating pretending to be you - this does not indicate your LSE account is compromised. The best thing to do is warn your colleagues in your team/division and report the phishing email to phishing@lse.ac.uk.

Tip: Check the sender line before replying, especially on your phone! The mobile app for Outlook does not show the sender's email address immediately, unless you tap.

Screenshot 2023-02-09 at 14.30.23 

Your Password's Changing!

DTS will never contact you via email to say your password is expiring. As of November 2021, periodic password changes are no longer a part of the School's Password Policy. 

Tip: If you're told your LSE account will be disabled within 24 hours and all your data will be wiped and unrecoverable - it's a scam!

Inkedphishingex4

Microsoft Teams Phishing

As we continue hybrid learning and working, be aware that bad actors are increasingly sending Microsoft Teams phishing.

Tip: Look for wonky characters & fonts, typos, and blurry graphics.

Inkedphishingex5

DocuSign Phishing

DocuSign is commonly used for sending and receiving digital signatures for imporant paperwork. Unfortunatey, this software is frequently spoofed by bad actors to send phishing links.

Tip: Think twice if an email asks you to click on a link to view a document

Inkedphishingex1

Spoofing

Did you know that phishing pretending to be someone else - typically a more senior colleague - is called spoofing? In this example, the sender calls the recipient by their given name and forges the spoofed user's signature to encourage a quick reply.

Tip: Gmail is a popular email domain used to spoof

 Inkedphishingex3_LI

Spoofing Emails on your Phone

Spoofing can be even harder to spot when you're on the go and checking your phone. Mail apps often minimize the sender's full email address, as seen in this SharePoint phishing example.

Tip: Avoid clicking on a link on your phone & wait until your in your office/on campus/at home again to read the full message & double check the sender

Inkedphishingex2

Whaling

Did you know that the bigger the phish, the more we call it a "whale"? Whaling is a type of phishing that spoofs high-ranked individuals (CEO/CIO, directors) who are at the top of an organisation's hierarchy. 

Tip: the odds that the School's Director wants your WhatsApp to buy a gift card are, quite frankly, very low.

InkedWhalingPhishing_LI

Twitter Phishing

You could receive phishing pretending to be from Facebook, Twitter, Instagram, TikTok, Snapchat and LinkedIn. This example wants you to click the hyperlink and enter your LSE or personal credentials.

Tip: Check your social media app. If you don't have issues using Twitter, there's no reason your profile should be blocked "for security reasons"

TwitterPhishing

Voicemail phishing

If you're not expecting a voicemail, don't fall for voicemail phishing emails! These are an older but nevertheless persistent type of phishing to stay aware of. We've also received reports of FAX phishing.

Tip: Legitimate LSE voicemails should only be emailed from <voicemail@lse.ac.uk>.

InkedVoicemailPhishing_LI

DropBox Phishing

The School does not recommend using DropBox, because it's not GDPR-compliant. You won't receive a DropBox email from LSE. And a third party sender asking you to click on a link to view a document is suspicious, like in this example.

Tip: A mixture of different fonts, underlined words, and different text colors are typical indicators of a fake message.

DropBoxPhishing

Anti-Virus Phishing

Bad actors have even preyed on users who want to be cyber secure and use an anti-virus (AV) software. In this example, the sender is spoofing Norton, and if a user calls the 1-800 number they will most likely be asked for personally-identifiable information and credit card/bank details.

MalwareBytes, Avast, and McAfee are other commonly used AV software that could be spoofed. 

Tip: Sophos is provided for free from LSE. If you use this licence, you will never receive a Sophos bill via email.

InkedAVPhishing_LI

Remittance Phishing

This increasingly pervasive species of phish claims you're receiving money, and all you have to do is download the attachment/click the link. These emails may look very simple, but the social engineering is powerful - everyone wants to receive a payment!

Tip: Don't reply! Check your OneFinance or contact the School's Finance Division using their web enquiry form. Please do not contact the DTS (IT) Service Desk with queries about OneFinance.

InkedRemittancePhishing_LI

Smishing

When you get an SMS/text message that's phishing, we call that "smishing" This can be a very tricky phish to catch - I once receive smishing from "Evri" (the new name for Hermes parcel delivery service) the same day I received a legitimate delivery from Evri.

Tip: You should never owe money (£2.99/$3.99 etc.) in order to receive a package. If you did, you already paid shipping when you ordered the item. Ignore & block the number.

SmishingPhishing

Instagram Phishing

Bad actors are aware you may be using multiple social media platforms, and they're targetting those accounts with fake "Your password's expiring", "Geographically improbably logins", or "Your account's violated community guidelines".

Tip: Real social media platforms (FaceBook, WhatsApp, Instagram, TikTok, etc.) may send you an email notifying you of a recent login (time and IP address). But they will never ask you to login and enter your password!

InkedInstagram Phishing_LI

Transferwise/Wise phishing

In this example, the bad actor wants you to click on the blue hyperlink 'Go to your account' and provide your credentials to access your Wise (formerly Transferwise) bank account. 

The message says you need to click the link to secure your account - ironic, because falling for this phishing email would compromise any money held in this Wise account! 

wise phishing

 

Fax phishing

A fax is the telephonic transmission of scanned printed documents, which are sent from a sender's fax machine to a recipient's telephone number associated with a receiving fax machine, which then prints the document.

This is an older technology, and you should not be expecting to receive a fax document at LSE! fax phishing

Spoofed recipient phishing

Ever wondered what you would do if you saw an email sent from yourself to yourself, and you know you didn't send it??

spoofed recipient phishing 2

This is a very common scare tactic of social engineering. A bad actor has "spoofed" your email address, so they can lie that they have compromised your LSE account. Recipient spoofing can try to steal your LSE credentials. It is also frequently used to blackmail people, to lie about compromising your device and using your web camera to spy on you, in order to extort money.  

Please remember - this is not true. An email header can be manipulated to make it appear like your LSE account emailed itself, but this didn't happen. It's a lie and you should not feel threatened. 

If you ever see an email like this example in your LSE inbox, let us know asap at phishing@lse.ac.uk

spoofed recipient phishing

Clean up your LSE storage phishing

Similar to our earlier advice about "changing your password" phishing - LSE will never email you to say you've run out of account storage. This tactic wants to make you worry about losing access to your data, so you'll input your LSE credentials more quickly and without asking questions.

If you fall for this type of phishing, change your password immediately and contact phishing@lse.ac.uk

clean up storage phishing

Ghostwriting phishing

Academic integrity may not seem like a typical cyber security topic - we focus on protecting your data and account security. But scams targetting the higher education sector are pervasive, and it's important to recognise them and report them like you would any other phishing.

In this example, a student reported receiving an email offering ghostwriting services. There are many ethical issues here and also cyber security risks from clicking on the email - you could compromise your LSE account, viruses could infect your devices, your data could be locked with ransomware, and your personally-identifiable information, including payment details, could be stolen. 

ghostwriting phishing

Amazon Prime phishing

Bad actors are following our online spending habits - and crafting phishing emails that look like an Amazon Prime bill. 

Let's analyse this example of social engineering to understand potentially how manipulative it is. You can see it asks you to call a phone number for more information.This tactic preys on anyone who isn't very tech saavy and would prefer a phone call over online chats/emails. It says a large payment has been charged, which would cause anyone alarm, and espeically in the ongoing cost of living crisis.

What would happen if you called the number? In this case, they would most likely be spoofing Amazon customer service. The bad actor can record your voice and use it for other fraudulent purposes later. They may ask you how your day has been, and try to engage in a conversation to make you feel more comfortable. Alternatively, they can be abrasive and threaten you that the card payment won't be cancelled unless you share details immediately - at which point, they begin asking you to share credit card/bank details, your billing address, and other personally-identifiable information to "confirm" the Amazon purchase.

Remember that social engineering is very deceptive - and the right phish at the wrong time will catch anyone. Be extra careful! Phish can start with an email AND they can continue over phone calls.

amazon phishing

Want to Know More?

Learn more about phishing and how to spot it in our Iron Rule 1: Beware of Phishing