UCT Phish Bowl
Phishing attacks remain a constant threat. Whether they are sent to large numbers of students and staff or target the systems and services we use daily, ICTS and the UCT Computer Security Incident Response Team are constantly having to address these attacks as they arise.
To help you stay updated on these ongoing threats, we have created a central location that you can check if the IT Helpdesk is aware of a suspicious email that you have received.View a list of the type of phishing tactics that cybercriminals use to access your personal information.
28 April: Beware of latest spear phishing attempt
1 February: Beware of latest file sharing phishing attempt
27 August: Update your mailbox
14 August: Hoax: UCT system hacked
22 October 2020: Microsoft Teams and Office 365
If you receive such a phishing email, please do not respond to the sender, instead send the message to the IT Helpdesk (firstname.lastname@example.org) for investigation.
You will need to send a copy of the original email or the header information in the original email.
Steps to follow if you have a myUCT email address
- Navigate to https://outlook.com/owa/uct.ac.za and log on with your UCT student number and password.
- On the selected email, navigate to and click on the ellipse to access More actions
- From the More actions fly-out menu, select View message details
- Select all of the message content and copy this into a new email address to email@example.com
Instructions to follow if using the Outlook desktop client
- Double-click the email message to open it.
- Click File in the top left corner > Save as.
- Select a location to save the email and click Save.
Send the saved file as an attachment to firstname.lastname@example.org.
To protect yourself against becoming phishing bait, be sure to follow these recommendations:
- Don't ever reply to emails, messages, or calls that request personal information – especially usernames and passwords.
- NEVER share your password or PIN with anyone – not even an ICTS representative, or representatives of your bank, mobile network, or other service providers.
- Ensure your passwords are complex by using a phrase, different languages or numbers, and symbols in place of letters.
- Ensure your anti-virus, operating system, software, browsers and apps are always up to date. McAfee Web Control checks and blocks sites that have a bad reputation. Ensure that you run this feature on your desktop so that you limit the number of suspicious websites that you visit.
- Do not open attachments unless you can verify the sender and the nature of the attachment.
- Don't open emails of unknown origin.
- Don't click on links in emails if you cannot recognise where the link directs you.
- Re-check links before clicking Search.
- Don't reply to spammers asking them to remove you from their mailing list. Replying just confirms your email address as valid, which encourages them to send you more spam.
- Please check the announcements on the ICTS and CSIRT websites for the latest alerts. If your suspicious email differs to the one in the announcement, please report it to the IT Helpdesk at email@example.com. You can report any other cybersecurity issues to the CSIRT at firstname.lastname@example.org.
- If something feels phishy, trust your gut and avoid the message or action. Report it to the IT Helpdesk at email@example.com.