The UCLA Information Security Office advises faculty, staff, and students to be vigilant when opening emails from unknown, suspicious, or unexpected senders. Some of these messages can contain malicious content in the form of infected file attachments or attempts to steal personal information through carefully crafted social engineering campaigns.
These emails, collectively called "phishing emails," or "phishing scams," are designed to trick campus users into providing their passwords and other identifying information to attackers. They can also be designed to extort money or trick users into navigating to fake login pages, which can sometimes mimic the look of well-known logon screens, like the UCLA Logon page.
If you find the suspicious email you received already recorded in the phish bowl, please mark the email as spam, and you're done. If it's not noted in the phish bowl, please mark it as phishing (instructions below) and forward it to Information Security Team. It will be added so others are aware of it.
If you have responded to a suspicious email and/or clicked on a link and entered any account or personal information, please immediately contact the IT Support Center or your local departmental IT unit and reset your account password to prevent scammers from using your account.
How to Report a Phishing Scam
The UCLA Information Security Office requests that campus users report phishing messages to our team so that we can proactively alert campus users and bring awareness to widespread phishing campaigns. In order for the Information Security Office to take action in response to a reported phishing message, please follow these steps:
- Please follow instructions on How to Report a Phishing Scam
- Send the resulting message and attachment to firstname.lastname@example.org with a subject line identifying the message as a phishing report.
It is important to be aware of fraudulent phishing schemes. Check back here as we update the list below with known phishing attempts.
The UCLA Information Security Office is aware of a phishing campaign attempting to coerce recipients into clicking an attachment and deceive users into providing their Duo authentication credentials. This is not a legitimate e-mail and recipients should not provide any information to the sender.
|06/12/2023||Fake Job Posting - UCLA Department of Psychology||
UCLA Information Security Office is aware of UCLA students being targeted by fake job/internship scams. Be mindful of phishing emails that may be disguised as a job opportunity.
Review the following security advisories related to recent job scams at UCLA and stay secure.
|06/12/2023||Fake UCLA Authentication Single Sign On (SSO) Web Page||
The UCLA Information Security Office would like to raise awareness and urge caution related to two external websites impersonating the legitimate UCLA Single Sign On (SSO) Authentication page to carry out credential harvesting attacks.
|05/16/2023||Urgent Payroll Request||
The UCLA Information Security Office is aware of UCLA staff being targeted by messages from cyber criminals attempting to commit payroll fraud.
|03/27/2023||Document shared with you: "HR BENEFITS.docx"||
The UCLA Information Security Office is aware of UCLA staff being targeted by messages from Google Docs with the subject "Document shared with you: "HR BENEFITS.docx" requesting an urgent review of a faculty evaluation Google Doc. The email usually indicates this request is coming from a leader within the organization, but the sender address is often non-affiliated with UCLA.
|03/23/2023||Office 365 - Authentication Notification||We would like to inform you about a new phishing campaign that targets Microsoft 365 users requesting them to change their password due to account expiration.|
|03/15/2023||Please confirm your email account with ucla.edu||
The UCLA Information Security Office is aware of UCLA staff/students are being targeted by messages from spoofed email addresses: account-security-noreply[@]ucla.edu making urgent calls to confirm their email accounts.
|03/11/2023||UCLA Gives - Making donations to an unaffiliated individual||
The UCLA Information Security Office is aware of a phishing campaign attempting to coerce recipients into making donations to an unaffiliated individual. The "From" (uclagives[at]ucla.edu) address in this campaign is using an impersonated UCLA email in a deceptive attempt to gain legitimacy.
|02/15/2023||UCLA Stand with Türkiye and Syria||
The UCLA Information Security Office is aware of a phishing campaign attempting to exploit the earthquake tragedy in Turkey to coerce recipients into making donations to an unaffiliated individual. The "From" (uclagives[at]ucla.edu) address in this campaign is using an impersonated UCLA email in a deception attempt to gain legitimacy.
|01/26/2023||Changing of my Direct Deposit||Fraudulent Employee Direct Deposit Information Urgent Update Requests|
|01/12/2023||Document shared with you: "2022-2023 Faculty Evaluation .Docx"||Impersonation of a leader within the UCLA organization requesting they review a fake Google Doc evaluation.|
|01/08/2023||Impersonation Email Campaigns: Kindly provide your available cell number i can reach you at||
Recently UCLA has seen a significant increase in the volume of “impersonation” email campaigns affecting the campus community. These email campaigns rely on social engineering tactics and generally involve the creation of a Gmail account with a very similar email address to a senior UCLA executive in a deception attempt to coerce the recipient into a response.
|09/06/2022||Waiting for the payment. I have e-mailed you from your account email scam||Scam emails claim that an explicit video featuring the recipient will be leaked unless a ransom is paid.|
|08/05/2022||JOB FOR YOU - Department of Psychology||Department of Psychology needs the services of students to work remotely as research assistants and gets paid weekly.|
|05/11/2022||JOB POSITION!||We urgently require the services of students to fill the position of Research assistants on a part time basis and get paid $350 weekly. The position can be served remotely and materials needed to work with will be provided by the department .|