Spot Fraudulent Emails (Phishing)
Step One Is Always Confirm the Source
If you receive an unexpected message that asks you to take action by clicking a link or to do something unusual like sending a gift card, check the Phish Bowl and Verified Communications to see if it’s listed there. Still not sure? Call the sender by phone and ask if they sent the message, or ask your local IT support staff or the IT Service Desk.
- Some phishes (fraudulent emails) targeting Cornell are listed at the IT@Cornell Phish Bowl.
- Some trusted emails from departments are listed at Verified Cornell Communications.
- If the request appears to be from a Cornell department, contact the department with information you find when you look up its number at Search Cornell.
- If the email isn’t listed at Verified Cornell Communications, and you don’t get a timely response from the department, contact the IT Service Desk for help.
- If it appears to be from a service outside Cornell, such as your bank, PayPal, eBay, or a credit card service, look up their contact information using a trusted source (the 800 number on the back of your credit card or by searching for the service’s official website at a trusted search engine).
Report suspected phishes to the IT Security Office. Be sure to include the entire text of the message and email headers. Use the Phish Bowl to see some phishing (fake) emails that have been spotted at Cornell.
Obvious Clues That May Indicate an Email Is a Scam
- Poorly written. It may be written with ALL CAPS, have spelling and grammar errors, or may seem fragmented.
- Asks you to send personal information (Social Security, credit card, bank account, or phone numbers, passwords, date of birth, address, etc.).
- Tries to scare you into reacting by creating a sense of urgency with exclamation points, words like “immediately,” or threatening to close an account.
- Offers something that's too good to be true.
- Has a From address that doesn’t make sense or doesn't match the domain where it really came from.
- Requests money for disaster relief or another cause.
Video: Email Phishing 101
As criminals gain access to more information about people, fraud attempts become more sophisticated and narrowly targeted. These are some of the most common scams.
- Gift card scams: do not buy gift cards without first validating the purchase with your supervisor over a phone or video call.
- Job and internship scams
- Messages targeted to stir your emotions: threats, a false sense of urgency, or a deal that's too good to be true.
- Faked Zoom links (Cornell meetings always start with https://cornell.zoom.us/).
- Faked websites and email addresses that look similar to legitimate popular websites, such as eBay, Amazon, or personal banking sites.
- Faked CUWebLogin pages
- Faked Duo (Two-Step Login) pages
- Messages claiming to be from a Cornell office or official, requesting personal information and passwords.
- Invitations to see photos of family or friends, greeting cards, or pleas for disaster relief assistance.
Hover over URLs before You Click
Don’t assume that what you see is where you’ll go when you click. If you’re expecting a link to go to a Cornell webpage, make sure the first chunk of the address (after the https or http part) ends like this: cornell.edu/ with nothing between cornell.edu and the slash. Watch out for fake pages that have tricky endings like this one: .net/cornell.edu (it’s a fake because “cornell.edu” is after the slash, instead of before it).
In many browsers and email programs, hovering over a link (without clicking) lets you see the ACTUAL URL for the link. If the underlying link is different, be very cautious. As an example, hover over the following link and look for the real link to display in your browser (often in the bottom left corner): www.icecream.edu.
Also, be cautious of any link that doesn’t clearly indicate where it leads. Hover over the links below to see what's hidden beneath:
Watch Out for Forged Email Addresses
From addresses in emails are more complicated to check, but they are very EASY to fake. Anybody can make a From address look like it came from someone you trust just by the Display Name alone. For example, an email may look like it’s from “Cornell Workday Notice” but on closer inspection, the email address is imacrook @ isteallstuff.com. You can investigate whether an email address is real by checking the email headers.
What to Do If You Responded to a Suspicious Email
Report immediately if you believe you were tricked into clicking a potentially dangerous link or attachment. Contact Cornell's IT Security Office at email@example.com.
If you think your Cornell NetID was compromised, immediately change your password, then contact the IT Security Office.