{"id":2105,"date":"2019-11-20T23:23:49","date_gmt":"2019-11-20T23:23:49","guid":{"rendered":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/?p=2105"},"modified":"2019-12-02T14:35:30","modified_gmt":"2019-12-02T14:35:30","slug":"phishing-emails-continue-to-target-hunter-students","status":"publish","type":"post","link":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/2019\/11\/phishing-emails-continue-to-target-hunter-students\/","title":{"rendered":"Phishing Emails Continue to Target Hunter Students"},"content":{"rendered":"<figure id=\"attachment_2114\" class=\"wp-caption alignleft\" style=\"max-width: 384px\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2114\" src=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/PhishingIllus.jpg\" alt=\"\" width=\"374\" height=\"224\" srcset=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/PhishingIllus.jpg 800w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/PhishingIllus-300x180.jpg 300w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/PhishingIllus-768x461.jpg 768w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/PhishingIllus-310x186.jpg 310w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><figcaption class=\"wp-caption-text\">Illustration by Ernie Smith, iStock<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Phishing emails continue to bombard student inboxes with faux offers representative of a larger issue of spam emails nationwide.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email scams have existed for over 10 years at Hunter, but \u201cin the past year and a half, it\u2019s become a much bigger problem and is happening more often,\u201d says Shayne Bernstein, associate director of Career Development Services. \u201cWe contacted IT and I know they are also aware of the scams, I don\u2019t know what their course of action is,\u201d says Bernstein.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-sees-250-percent-phishing-increase-malware-decline-by-34-percent\/\"><span style=\"font-weight: 400;\">Microsoft<\/span><\/a><span style=\"font-weight: 400;\">, used by Hunter College, has seen a 250% increase in phishing emails during last year. <\/span><span style=\"font-weight: 400;\">Scammers try to obtain personal information by luring victims using job offers, money or urgent messages to gain access to accounts, commit crimes and download viruses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The recent emails Hunter students receive are more intricate because they are specifically tailored to look like a trusted sender. Known as spear phishing, scammers leverage data and research information specific to Hunter to seem more believable by replicating offices such as Career Development Services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These emails are nothing new to students like Tamara Casco, a junior at Hunter College. She has been receiving it for the past three years and got hacked this semester. \u201cI never click on anything yet I got hacked,\u201d she says.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Casco started receiving multiple emails saying a scam email that was sent from her account could not be delivered to the senders. \u201cI didn\u2019t realize until my social work professor forwarded an email I hadn\u2019t sent and let me know I was hacked,\u201d she said. \u201cIt\u2019s embarrassing because they sent it to every contact on my Hunter email.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Panicked, Casco went to the Hunter Information Technology office and was told to change her password. Once she did, it didn\u2019t make a difference when phishing emails were still being sent from her address. Immediately, she went back to the IT office who advised her to change her password into something harder. However, they did not offer any explanation as to how they are tackling this issue.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Casco was frustrated and confused by IT\u2019s response. \u201cAre you not interested in knowing who hacked my account? Are you not interested in fixing it?\u201d she told The Athenian she wondered at the time.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The IT office tells students to <\/span><a href=\"http:\/\/www.hunter.cuny.edu\/it\/it-services\/phishing-spam\"><span style=\"font-weight: 400;\">\u201ccheck it before you click it.\u201d<\/span><\/a><span style=\"font-weight: 400;\"> They ask to report the fraudulent emails and keep a<\/span><a href=\"https:\/\/owl.hunter.cuny.edu\/ords\/f?p=113:1:8485332518573:::::\"> <span style=\"font-weight: 400;\">list<\/span><\/a><span style=\"font-weight: 400;\"> of reported emails dating back to 2016 which they provide as a resource for students.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A representative from Hunter\u2019s IT office declined to comment on how they\u2019re handling the issue, calling it \u201ctoo political.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Job scams are popular in the phishing world. It \u201ccauses confusion for students who think it&#8217;s coming out of our office,\u201d says Bernstein. \u201cWe have a database where we research quality opportunities for students. We have a reputation to uphold and want students to feel secure.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A typical employment scam works like this: Once the student shows interest in the job, they are told certain supplies are required and is sent a check to deposit into their personal checking account. The bank makes the funds available before the check is cleared when scammers instruct them to wire funds to another individual for those supplies and to keep the rest. However, the check is fraudulent resulting in the student reimbursing the bank and losing money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nationwide, 30% of targeted emails are opened by users and 12% of those users click on the malicious link according to<\/span><a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\"> <span style=\"font-weight: 400;\">Verizon<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Members from Hunter College Students on Facebook frequently share the phishing emails they receive. Some reach out for help and question the validity of the emails, while others are amused by how terribly they\u2019re written.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cI don\u2019t know who else to ask for advice so I thought I would ask this group,\u201d wrote student Jen Pareja. \u201cI recently got an email from my own Hunter account saying I got hacked by a Trojan last October. They said they want me to pay or else they\u2019ll do something.\u201d Other students, however, were quick to inform Pareja it was a scam and to not fall for it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Students at CUNY\u2019s 25 campuses are experiencing these privacy issues. They are handled by CUNY\u2019s central office who switched Hunter\u2019s email to Office 365 which was meant to \u201cprovide better spam and virus protection,\u201d as stated on their <\/span><a href=\"http:\/\/www.hunter.cuny.edu\/it\/it-services\/newstudentemail\"><span style=\"font-weight: 400;\">site<\/span><\/a><span style=\"font-weight: 400;\">. However, emails continue to circulate affecting students.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to<\/span><a href=\"https:\/\/www.consumerreports.org\/identity-theft\/college-students-face-risk-of-identity-theft\/\"> <span style=\"font-weight: 400;\">Consumer Reports<\/span><\/a><span style=\"font-weight: 400;\">, college students are more prone to identity theft. \u201cSome scams are very appealing because it\u2019s very little work for a lot of pay. Students fall for that,\u201d says Bernstein.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Federal Bureau of Investigation released a<\/span><a href=\"https:\/\/www.ic3.gov\/media\/2017\/170118.aspx\"> <span style=\"font-weight: 400;\">statement<\/span><\/a><span style=\"font-weight: 400;\"> that phishing employment scams continue to lure college students all over the country leaving them vulnerable to identity theft.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAnything that seems too good to be true, you should be wary of,\u201d advises Bernstein.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-2118 aligncenter\" src=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-1024x683.jpg\" alt=\"infographic\" width=\"610\" height=\"407\" srcset=\"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-1024x683.jpg 1024w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-300x200.jpg 300w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-768x512.jpg 768w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-210x140.jpg 210w, https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-content\/uploads\/My-Post-310x207.jpg 310w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing emails continue to target Hunter students by hacking email addresses and sending mass messages to fool victims into giving up personal information.<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[184,116,211,212],"class_list":["post-2105","post","type-post","status-publish","format-standard","hentry","category-news","tag-cuny-hunter-college","tag-hunter-news","tag-phishing","tag-scam-emails"],"_links":{"self":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/2105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/comments?post=2105"}],"version-history":[{"count":8,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/2105\/revisions"}],"predecessor-version":[{"id":2121,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/posts\/2105\/revisions\/2121"}],"wp:attachment":[{"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/media?parent=2105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/categories?post=2105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brie.hunter.cuny.edu\/hunterathenian\/wp-json\/wp\/v2\/tags?post=2105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}