- Staff IT Service Desk
- IT Service Catalogue
- IT Security
- Infrastructure and Security Standards
- Online services
- Storage Options
- Return to Work on Campus
- Teaching or Working Remotely
- IT Training Centre
- Student IT Services
- IT Services Newsletter
- History of Computing in UCC
- IT Vacancies
- Open Days
Example of a recent Email Scam
From: firstname.lastname@example.org <email@example.com>
Sent: 23 October 2018 02:12
To: Bloggs, Joe <firstname.lastname@example.org>
Subject: password (popcorn1) for email@example.com is compromised
I'm a hacker who cracked your email and device a few months ago.
You entered a password on one of the sites you visited, and I intercepted it.
This is your password from firstname.lastname@example.org on moment of hack: popcorn1
Of course you can will change it, or already changed it.
But it doesn't matter, my malware updated it every time.
Do not try to contact me or find me, it is impossible, since I sent you an email from your account.
Through your email, I uploaded malicious code to your Operation System.
I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources.
Also I installed a Trojan on your device and long tome spying for you.
You are not my only victim, I usually lock computers and ask for a ransom.
But I was struck by the sites of intimate content that you often visit.
I am in shock of your fantasies! I've never seen anything like this!
So, when you had fun on piquant sites (you know what I mean!) I made screenshot with using my program from your camera of yours device.
After that, I combined them to the content of the currently viewed site.
There will be laughter when I send these photos to your contacts!
BUT I'm sure you don't want it.
Therefore, I expect payment from you for my silence.
I think $848 is an acceptable price for it!
Pay with Bitcoin.
My BTC wallet: 1JTtwbvmM7ymByxPYCByVYCwasjH49J3Vj
If you do not know how to do this - enter into Google "how to transfer money to a bitcoin wallet". It is not difficult.
After receiving the specified amount, all your data will be immediately destroyed automatically. My virus will also remove itself from your operating system.
My Trojan have auto alert, after this email is read, I will be know it!
I give you 2 days (48 hours) to make a payment.
If this does not happen - all your contacts will get crazy shots from your dark secret life!
And so that you do not obstruct, your device will be blocked (also after 48 hours)
Do not be silly!
Police or friends won't help you for sure ...
p.s. I can give you advice for the future. Do not enter your passwords on unsafe sites.
I hope for your prudence.
Fraudulant Purchase Order Email Scam
What is the fraudulent purchase order scam?
UCC has recently been targeted by a series of fraudulent purchase order emails. This is a scam wherein fraudsters attempt to obtain equipment from suppliers by providing them with a forged UCC purchase order.
The scam operates in the following way: A supplier will receive an email requesting a quotation for specific item/s of equipment, often medical or I.T. equipment, and often in large quantities and of high value. Once the quotation has been provided, a purchase order is emailed to the supplier, which bears resemblance to an authentic UCC purchase order. The purchase order typically instructs delivery to an address not affiliated with UCC. After shipping the item/s of equipment, the supplier never receives payment and is unable to retrieve the shipped products.
How to identify the Fraudulent emails/POs:
- Incorrect domain names are used to send emails and purchase orders. A valid UCC email address will always end in @ucc.ie or @tyndall.ie An example of an incorrect domain being used in these fraudulent emails is @uccie.com
- The shipping address is not a location in UCC. Fraudulent addresses will typically be a domestic residence or a self-storage facility, often based in Dublin, or other locations nowhere near UCC.
- Poorly written email with grammatical errors are always a sign of a suspicious email.
- Unusually large quantities are requested.
- Rush to ship priority/overnight
- Use of a false or unknown contact from the university. If requests are received from an unknown university contact that raises your suspicion, please contact the UCC Procurement Office by email: email@example.com or by phone: 353 (0)21 490 3514 to verify the validity of the request. Do not contact the name/number used on the email/purchase order. Please note fraudulent emails may contain seemingly legitimate contact information so it is important to look for other signs.
What you can do:
Confirm legitimacy: If you are unsure about a quotation request sent by email, or the subsequent purchase order, please contact the UCC Procurement Office for confirmation of its legitimacy.
Report suspicious emails: If you have received any suspicious emails please forward them to firstname.lastname@example.org