The campus has recently been targeted by malicious emails that appear to attempt to steal usernames and passwords. One such phishing email appears to be about payroll being rescheduled and includes a link. These emails are not authentic. If you receive one, do not click on the link in the email. Individuals who received this email should simply delete the message.
If you did click on the link or are otherwise concerned that you did something to expose your account, IdentiKey, or other personal information, please call the IT Service Center during normal business hours at 303-735-4357 or email firstname.lastname@example.org. For more information on the IT Service Center, including hours, visit OIT website.
Following is a sample of the malicious message:
Subject: Payroll Rescheduled
1 New Notification Regarding Your 2019 Payroll
University Colorado Boulder
- The university will never send email asking for private data (e.g. passwords, SSNs, credit card numbers, etc.) Always be suspicious of messages asking for private information.
- If you ever receive a suspicious email, do not reply or click any links or open attachments.
- You might receive a phishing email from someone you know, particularly if that person’s account has been compromised through a phishing attack.
- It’s good practice to never click a link in an email. Instead, open a web browser and type the website address or search for it using a legitimate search engine.
Although the university uses technology to block malicious emails and phishing websites, this technology is no substitute for being a conscientious Internet user. You can report messages that you believe might be phishing attempts by going to OIT's suspicious message page. There you will also find a link to a site that lists recently reported phishing attempts.
If you ever have questions about the legitimacy of a message, contact the IT Service Center at email@example.com or 303-735-4357 (5-HELP from a campus phone). Email and phone help is available Mondays through Fridays 7:30 a.m. to 7 p.m. Learn more on the OIT website.