...
Attack | Description | Action you should take |
---|
PhishPhishing | Attacks that are carried out in order to steal usernames, passwords, credit card information, Social Security NumbersSSNs, and other sensitive data by masquerading as a trustworthy entity. Most often the emails pretend to be from credible sources such as, financial organizations or online services. These . These messages often ask you to click on a link, send information via email or fax, or enter credentials into a seemingly legitimate websiteby pretending to be a credible website (such as a bank). | Report to [email protected] by forwarding as an attachment or using Phishme Reporter --instructions below. |
Targeted Phishing | These are attacks that are in the context of use your affiliation with Berkeley Lab, UCB, UC, or DOE to steal sensitive data (i.e. usernames, passwords, SSNs, etc). These messages could use names of co-workers, appear to come from LBL email addresses , or directly reference Berkeley Lab employees. These can be very difficult to distinguish from legitimate messages and are important to notify the Cyber Security team about quickly. | Report to [email protected] by forwarding as an attachment or using Phishme Reporter --instructions below. |
Spam | These are unwanted messages but are not asking for sensitive information. | Use Link in New Window |
---|
linkText | spam reporting procedures |
---|
tip | https://commons.lbl.gov/display/itfaq/spam-report-procedure |
---|
href | https://commons.lbl.gov/x/AQKMAw |
---|
|
|
...
- For more information on phishing see the Cyber Security Resources page on
Link in New Window |
---|
linkText | Spam, Phishing, Targeted Phishing |
---|
tip | https://commons.lbl.gov/display/cpp/Spam%2C+Phishing%2C+Targetted+Phishing |
---|
href | https://commons.lbl.gov/display/cpp/Spam%2C+Phishing%2C+Targetted+Phishing |
---|
|
How do I report a phishing email?
...
This extension adds a button in Gmail. With this extension, just select the email that you suspect is a phish and click the Phishme Reporter button.
Installation instructions:
...
Send an email to [email protected] reporting the incident and include the source code of the phishing email as an attachment. If you do not know how to attach the source code click here to learn how to forward the source code of an email as an attachment: Forward Email As
Link in New Window |
---|
linkText | Forward as Attachment |
---|
tip | https://commons.lbl.gov/display/itfaq/Forward+As+Attachment |
---|
href | https://commons.lbl.gov/display/itfaq/Forward+As+Attachment |
---|
|
Feedback
In order to improve this program please fill out this form after receiving a simulated phishing email:
Link in New Window |
---|
linkText | Simulated Phishing Feedback Form |
---|
tip | https://docs.google.com/a/lbl.gov/forms/d/1mOLv2WmepMK33BW2bHg--oc9kguK1I0_xOX8gDoC2kM/edit?ts=5772e843 |
---|
href | https://docs.google.com/a/lbl.gov/forms/d/1mOLv2WmepMK33BW2bHg--oc9kguK1I0_xOX8gDoC2kM/edit?ts=5772e843 |
---|
|
...