KEK Top Users Office Top Japanese Site map Links
top2
1 2 3 4 5 6 7 8 9
line


  UO Bulletin Board 

 Back Number Y2012-2014  Y2015  Y2016 Y2017 Y2018
 #1083   October 21, 2019.


    Scattering attack e-mails from an attacker disguised as actual people concerned


    We confirmed that e-mails that misrepresent actual people concerned, such as KEK employees were sent to multiple employees.
   Each e-mail is accompanied by a file in word format. By opening this file, your computer may be infected with a computer
   virus.
   The name of the sender of these e-mails was faked as a real, existing person at KEK.

   Please pay attention to the following precautions.

   1.Sender's name and address in the "From:" field Keep in mind that the "From:" address your e-mail software displays can be
    faked.
    Depending on your e-mail environment, there is a case where multiple addresses are listed.
    It implies that the displayed sender is different from the real sender.
    You need to pay special attention in this case because the possibility that the e-mail is a faked attack is high.

    Example:
    When the real sender masquerades as High Energy Taro , the "From:" field may look like: From: High Energy Taro ,,depending
    on your e-mail environment.

   2.Phishing e-mails
    Currently, e-mails with the following features are confirmed. Please note that those with any other pattern may be sent in the
    future.
    Subject: Application pack 2019/10/16
    Attached file:****.doc

   3.If you receive the phishing e-mails.
     If you receive the e-mail like this, delete it promptly. Never open the attached file or reply to the sender.

   * If you opened the attached file of this e-mail, IMMEDIATELY update the anti-virus software definition file to the latest, unplug
     the LAN cable, and scan for viruses, and contact KEK CSIRT.

   Safety tip:
   If you believe you need to open an attachment of a similar e-mail, contact the sender to make sure that the e-mail is real.
   To do this, do not use the contact information in the e-mail. Instead, you should rely on independent sources such as phonebook
   or business cards.

   Contact:KEK CSIRT.


     
 updated: 2019-10-03
line
shita