{"id":243,"date":"2017-09-19T16:50:04","date_gmt":"2017-09-19T16:50:04","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itsecurity\/?p=243"},"modified":"2018-11-02T11:13:45","modified_gmt":"2018-11-02T11:13:45","slug":"fake-fax-notifications","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/09\/19\/fake-fax-notifications\/","title":{"rendered":"Fake Fax Notifications"},"content":{"rendered":"<p>There are a number of emails circulating claiming to have fax messages attached.\u00a0 These contain word attachments which are infected with a macro virus.\u00a0\u00a0 The messages are all from genuine senders who have been infected with the virus.<\/p>\n<p>If you receive any messages with attachments which are unexpected, please delete them and do not attempt to open the attachment.\u00a0 This applies even if it is a genuine University sender and you know them.<\/p>\n<p>If you have opened the attachment, switch off your computer immediately and contact the IT Service Desk for advice. \u00a0Contact details are as follows:\u00a0<a href=\"http:\/\/kb.bham.ac.uk\/KB10074\/\">http:\/\/kb.bham.ac.uk\/KB10074\/<\/a><\/p>\n<p>An example is shown below, although the message content does vary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-244\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/09\/fax-message.jpg\" alt=\"Example of fake fax message email\" width=\"421\" height=\"392\" srcset=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/09\/fax-message.jpg 421w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/09\/fax-message-300x279.jpg 300w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/09\/fax-message-250x233.jpg 250w\" sizes=\"auto, (max-width: 421px) 85vw, 421px\" \/><\/p>\n<p>There is little at a technical level to show that this is not genuine.\u00a0 However the content has clues that should help to identify it as a scam.<\/p>\n<p>Most of us don&#8217;t get notifications of faxes arriving from random colleagues attached as word documents.\u00a0 Secondly, the content of the message implies that you have received a fax personally and yet the message is sent to multiple people including lists in most cases.<\/p>\n<p>For general advice on how to spot malicious messages, please see the following article previously published<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Pjlbabcjv3\"><p><a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2016\/12\/22\/malicious-emails-and-how-to-spot-them\/\">Malicious Emails and How to Spot Them<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2016\/12\/22\/malicious-emails-and-how-to-spot-them\/embed\/#?secret=Pjlbabcjv3\" data-secret=\"Pjlbabcjv3\" width=\"600\" height=\"338\" title=\"&#8220;Malicious Emails and How to Spot Them&#8221; &#8212; IT Security\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a number of emails circulating claiming to have fax messages attached.\u00a0 These contain word attachments which are infected with a macro virus.\u00a0\u00a0 The messages are all from genuine senders who have been infected with the virus. If you receive any messages with attachments which are unexpected, please delete them and do not attempt &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/09\/19\/fake-fax-notifications\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Fake Fax Notifications&#8221;<\/span><\/a><\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,3,15],"tags":[],"class_list":["post-243","post","type-post","status-publish","format-standard","hentry","category-malicious-email","category-examples-of-malicious-email","category-malware-examples"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/comments?post=243"}],"version-history":[{"count":3,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/243\/revisions"}],"predecessor-version":[{"id":249,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/243\/revisions\/249"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/media?parent=243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/categories?post=243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/tags?post=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}