Phishing and Scams
Phishing is a form of social engineering delivered by email. Phishing scams appear to originate from a trusted source to trick you into entering your credentials, revealing personal identifying information (PII), or sending money to them.
The attacker can then use this information to access your accounts, gather additional private information about you in an attempt to steal your identity, and make purchases or apply for credit in your name.
To learn more about phishing and social engineering, read the information here.
Phishing Tips
- Move your mouse over links in emails and it may show a different URL than the one displayed.
- If you are encouraged to click a link that claims to lead to a legitimate site (such as Amazon), look online for a trusted URL leading to that site instead.
- Check the sender address to verify that the email comes from an official source.
- Check for slight mispellings - in the URL, company name, etc. For example, paypa1.com instead of paypal.com.
- Use additional software - Many browsers have add-ons/extensions/plug-ins that can help detect phishing sites.
- Be wary of anything that gives a sense of urgency, or states that it requires immediate action.
- Don't click anywhere in suspicious emails—even in what may appear to be white space.
- Be wary of too-good-to-be-true offers such as free airline tickets or vacation.
- Don’t open attachments in unexpected or suspicious emails or instant messages.
- Don’t send passwords, bank account numbers, or other private information in an email.
Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through email.
For more advice on how to avoid phishing scams, visit our Fight the Phish page!
Have I Been The Victim Of A Phishing Scam?
If you believe that you have been the victim of a phishing scam, change your password immediately and report it to phish@kent.edu or submit a . Also, don't forget to check out this page for tips on how to keep your accounts safe. If you are using Gmail, you can also end all other active sessions. This should stop any unauthorized access to your account. Instructions on how to do this can be found . You can also end active sessions in Outlook by following the instructions .
When a victim of a phishing scam, it's common practice for the hackers to change your signatures, forwards, filters, and other settings. If you believe you fell victim to a scam, we recommend checking the following settings in your mail client.
- A signature for an email is text that is automatically inserted at the end of an email. It is usually something you choose to set up. Make sure it is not an unfamilar one setup.
- Forwards can be set up to automatically forward to another email address. Make sure it is not forwarded to unknown address without your permission.
- Inbox rules/filters can be used to automatically sort or delete anything in your inbox or sent box etc. Scammers can use it to re-direct/hide their messages.
- Check all of the folders in your email account - sometimes the malicious actor may create new folder to store messages they sent/receive or put them into the Trash when using your account to perform scams.
What Are Scams?
Scams come in many forms and are a type of social engineering to either gain your personal identifiable information (PII), or steal your money. They are getting more and more sophisticated, particularly when it comes to targeting you online and through mobile devices. It’s important to know how to recognize a scam so you can protect yourself from fraudsters.
Note that KSU does not delete @kent.edu accounts and will NEVER ask for your password through e-mail, so be wary of anything that says otherwise.
Please report any scams you receive to phish@kent.edu. You can learn about additional ways to report phishing scams here: Report Phishing
How To Detect a Scam?
- Scammers pretend to be from organizations you know
- They pretend that you won a prize or that there is a problem
- Scam calls will usually pressure you to act immediately
- If it sounds too good to be true, then it probably is
- Scammers will tell you to pay in a specific way
Steps To Avoid Scams
- Don’t give out any personal information
- Resist pressure
- Block unwanted calls or messages
- Don't click on any pictures, links, or white spaces in a suspicious email
- Stop and talk to someone before taking action or giving out any information
Please refer to the site to read more about common scams and how to report them.
Scammers are always trying to create new tactics to use against their targets. A recent phishing scam that has targeted 鶹ѡ is the financial aid phish. This scam claims that you have unclaimed financial aid or refunds, but you won't receive the money until you verify some of your sensitive personal information. In this article, you will learn how this scam works, how to recognize it, and what to do if you encounter one.
How Does This Scam Work?
There are several variants of this scam, but they all follow a similar pattern. The scammer will first send you a phishing email, often from a generic email address, such as a Gmail address. The email will claim to originate from 鶹ѡor one of the services used for student banking, such as BankMobile. There will be a message, either in the body of the email or attached as a document (Word document, PDF file, TXT file, etc). The message's wording will be different between scams, but will usually claim that you must claim your funds quickly by clicking a link or calling a phone number to verify your information.
Once you click this link or call the number, you will be asked for a great deal of sensitive information. This can include your full name, your personal email addresses and phone numbers, your FlashLine and BankMobile passwords, and even your social security number. If you provide your contact information, you may also be contacted by the scammer, who will ask you for additional information and details about any multi-factor authentication (MFA) that you have set up on your accounts.
If the attacker is able to obtain this information from you, they can gain access to your FlashLine and BankMobile accounts. They will be able to see any banking information that you have stored there, including account numbers. They can use this to withdraw money from your accounts. Furthermore, with your name, age, and social security number, there is a strong chance that they will attempt to steal your identity. Attackers can use your identity to make purchases and open lines of credit in your name.
How Can I Recognize This Scam?
This is a very dangerous scam that can lead to theft of your funds and identity. Therefore, it is important to know the signs of this scam, its red flags, and how to detect them. The most common red flags in these scams are as follows:
- Unusual sender: If you receive an email asking you to provide information regarding your university-related finances, check the sender's email address. 鶹ѡ, BankMobile, banks, and other legitimate organizations and financial services will send emails using addresses that they own, not a personal email address like a Gmail or Outlook address.
- Asked to click a link: Does this email ask you to click a link? Before you do, hover over the link to see where it really leads. This scam will often ask you to click a link, which will lead to a webpage that asks for your information. If you hover over the link and see that it leads to an unfamiliar website, or somewhere different than where the message claims it leads, do not click the link.
- Odd formatting: Was the email sent to you with nothing in its body? Does it have strange wording or mispellings? Does it contain an oddly-named attachment and lack any branding or logos? Poor formatting and misspellings are red flags that indicate the message was not sent from a legitimate and trustworthy source.
- Asked for sensitive information: Does the email ask you for your account's credentials, such as passwords or MFA information? Are you told to supply your social security number, date of birth, and other personal information? Legitimate companies will never ask for your password, which includes Kent State. Never provide your password to any email, text, or document that asks for it. Also, do not provide sensitive personal information to untrusted sources. If you cannot verify that you are sending information through a secure service (such as a company's official website) or talking with a legitimate representative of that company, do not send any information.
The screenshots below shows a real example of a financial aid phishing email that was sent to a member of the 鶹ѡ community. Can you spot all of the red flags in this message and its attached file?
What Should I Do If I Get This Scam?
The best thing for you to do when you get this scam is to report it! Forward the email you received to phish@kent.edu so that our team can remove the message from the mail system. This helps protect anyone else who may have received the email from falling victim to the scam. You can also report the scam to the companies that the email was trying to impersonate, such as BankMobile or your bank. You can read more ways to report phishing emails here.
If the scammer tried to contact you with a text message, you can block their phone number and report the message to your cellular service provider.
Once you have reported the scam, it is best to simply delete the email or text without responding to it.
I Fell Victim to This Scam
If you believe you may have fallen victim to this scam, you will need to contact 鶹ѡ's security team immediately at security@kent.edu or 330-672-5566. If you provided any information about your accounts with your bank or another financial service, you will need to contact your bank and the other financial services involved as soon as possible.
You can read more details about recovering from a scam and securing your accounts here.
Types of Phishing and Scams
When people refer to phishing, they are most commonly referring to phishing attempts delivered in an email. However, there are a few other types of phishing. You can read about them, as well as many different scams and techniques, by clicking a topic in the menu below: