{"id":6733,"date":"2019-12-09T16:15:45","date_gmt":"2019-12-09T15:15:45","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=6733"},"modified":"2023-06-01T13:18:43","modified_gmt":"2023-06-01T11:18:43","slug":"sicherheit-geht-vor-vorsicht-vor-phishing-mails-mit-rwth-namen","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2019\/12\/09\/sicherheit-geht-vor-vorsicht-vor-phishing-mails-mit-rwth-namen\/","title":{"rendered":"Safety first: Beware of Phishing Mails with RWTH names!"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_6733 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_6733')){$('.twoclick_social_bookmarks_post_6733').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2019\\\/12\\\/09\\\/sicherheit-geht-vor-vorsicht-vor-phishing-mails-mit-rwth-namen\\\/\",\"post_id\":6733,\"post_title_referrer_track\":\"Safety+first%3A+Beware+of+Phishing+Mails+with+RWTH+names%21\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><!-- \/wp:post-content -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>Students and RWTH employees often receive e-mails from official university addresses in their digital mailboxes. But if the sender says &#8220;RWTH&#8221;, are they really from a person who is a member of the university?<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>Unfortunately not always and therefore caution is necessary!<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:image {\"id\":6737} -->\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_6737\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6737\" class=\"wp-image-6737\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Bild-Phishing-2-1024x641.jpg\" alt=\"\" width=\"1024\" height=\"641\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Bild-Phishing-2-1024x641.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Bild-Phishing-2-300x188.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Bild-Phishing-2-768x481.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Bild-Phishing-2.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-6737\" class=\"wp-caption-text\">Caution before opening your e-mails! <br \/>Source: <a href=\"https:\/\/pixabay.com\/de\/photos\/finger-ber%C3%BChren-gesch%C3%A4ftsmann-2956974\/\">Pixabay<\/a><\/p><\/div>\r\n<\/figure>\r\n<!-- \/wp:image -->\r\n<p><!--more--><\/p>\r\n<!-- wp:paragraph -->\r\n<p>There are so-called E-mail Phishing attempts at the RWTH and therefore it is important to check before opening the message whether it is a secure sender. The dangerous thing about phishing e-mails is that they usually appear very realistic and official and that\u2019s why they increase the risk of students and staff being lured into an identity theft trap, for example.<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>Phishing Mails have fake senders and titles, or logos are misused, so it is important to know what the &#8220;real&#8221; e-mails at RWTH represent: Many of the official university email addresses are signed and with S\/MIME. This means that the employee and collective e-mail addresses have a security certificate.<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>This can be recognized even without opening an e-mail by a small red symbol next to the sender. This signature appears a little different in Thunderbird and AppleMail, but in a similar form:<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:image {\"id\":6738} -->\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"545\" height=\"95\" class=\"wp-image-6738\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Zertifikate-1.png\" alt=\"\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Zertifikate-1.png 545w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/Zertifikate-1-300x52.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/>\r\n<figcaption>E-Mail certificate sign<\/figcaption>\r\n<\/figure>\r\n<!-- \/wp:image -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>The IT Center is strongly opposed to phishing emails because they can have serious consequences, such as blocking RWTH addresses from other providers so that emails can no longer be sent and even contact with the public prosecutor&#8217;s office.<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>Since not all university emails are signed as shown above, it is important to take a close look at them and check the sender address. If something appears suspicious before opening the message, the mail should not be opened and no links contained in it should be clicked on. If this happens, the computer should be urgently checked for viruses.<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>If you suspect that your account is being misused, all passwords should be changed\u00a0 using our Selfservice page. In any case, the IT Center must be informed immediately so that further measures can be taken.<\/p>\r\n<!-- \/wp:paragraph -->\r\n<p>&nbsp;<\/p>\r\n<!-- wp:paragraph -->\r\n<p>Responsible for the content of this article are Jana Baur and Liza Schwarz.<\/p>\r\n<!-- \/wp:paragraph -->","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":1413,"featured_media":6740,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[314,315],"tags":[61,70,49],"class_list":["post-6733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-sicherheit","category-services-support","tag-it-sicherheit","tag-phishing","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/1413"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=6733"}],"version-history":[{"count":7,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6733\/revisions"}],"predecessor-version":[{"id":15946,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6733\/revisions\/15946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/6740"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=6733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=6733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=6733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}