Impersonation scam with subject “University of Victoria”

This scam email impersonates the university’s acting president. In all likelihood, this will turn out to be a gift card scam, where the scammer tells the recipient to purchase several hundred dollars’ worth of gift cards (typically for Apple iTunes or some other major brand). The recipient is then supposed to send photographs of the cards with the PIN cover scratched off, which gives the scammer enough information to redeem the balance. Here’s an example of how this type of scam might play out.

The red flags in this particular email:

  • The email claims to be from someone from UVic but came from an external email address–this is typically a sign of impersonation.
  • The request for assistance is vague and the sender asks for confidentiality. The scammer is probably trying to isolate the recipient to stop them from telling someone who might let them know it’s a scam.
  • The message says to send text messages to a phone number with a 401 area code, which is from Rhode Island. The non-Canadian phone number and the refusal to take phone calls indicates this number is fraudulent. Shifting the conversation away from UVic email is often done to move it to somewhere that can’t be caught by our security systems.

Therefore, do not reply and do not contact the phone number in the email. Reach out to the Computer Help Desk or your department’s IT support staff if you need assistance.

Scam email sent from Gmail, impersonating the UVic acting president.

From: Robina Thomas <office******7@gmail.com>
Subject: University of Victoria

[Recipient name],
Please let me know if you’re available. I have something I need your assistance with, and I would appreciate your confidentiality. Kindly reply to this email or, preferably, send me a text message only (no calls) at +1 (401) ***-**** for a quicker response.

Thank you,
Robina Thomas
President and vice-chancellor
www.uvic.ca
+1 (401) ***-****

Confidentiality Notice: This message, including any attachments, is intended solely for the use of the individual(s) to whom it is addressed. It may contain confidential and/or legally privileged information. If you are not the intended recipient, you are hereby notified that any review, dissemination, distribution, copying, or action taken in relation to the contents of this message any any attachments is strictly prohibited and may be unlawful

From the archives: How can I tell it’s really you?

This piece was originally written by Nav Bassi on September 17, 2020, for the now-defunct UVic CISO Blog. Reposting it here as much of the content remains relevant. The sad truth is that we’ve recently been seeing a lot of phishing emails coming from compromised accounts belonging to people the recipient knows. Even if the email is from someone you know, check for signs of phishing, like messages that don’t sound right for that person/organization or links that don’t go where they say they go.

If you get an email from someone you know but it feels a bit off, don’t reply to the email. The mailbox could be compromised or the email may have been crafted to send replies to a different, fraudulent email address. Either way, you could get a reply from the phisher saying that the email is legitimate when it really isn’t. Instead, verify in person, or reach out to a different contact method (such as by phone or video call) that you already have and know is legitimate.


Way back in 1993, Peter Stiener drew his “On the Internet, nobody knows you’re a dog” cartoon. It was referring to Internet anonymity but I think today, 27 years later, it is also relevant for impersonation email scams.

Most people understand that phishing is a form of social engineering conducted via email, and that it is often used to trick you into revealing your username and password. But what happens after you reveal your username and password? This depends on the attacker and their motivation. Some are loud and fast, they immediately use your username and password to log into your email account and use your account to send spam or more phishing emails. Others are quiet and fast, they immediately try to use your username and password to access services on your behalf to see what useful data they can steal. At UVic, just log into your online services and think about what an attacker could do if they could see and access everything as you! Some are both quiet and slow – hard to detect, and often patient enough to try something bold.

If you receive an email from someone out of the blue, and it doesn’t sound like them, you might get suspicious. Maybe it’s the wording or language, or maybe it’s even the topic of the message, but you might use your phishing awareness training to take a closer look at the From: address or even report it to your IT personnel and discover the sending address is wrong. This is an impersonation email, and we get them all the time: An email exchange with the President (not really).

What if you are already in an email conversation with someone, having a series of back and forth exchanges? Would you notice if suddenly the response to your last email was not from them? In this case, what has happened is an attacker has accessed a person’s email account and spent time, perhaps many days or weeks, monitoring emails going in and out of the mailbox until they see something of interest. For example, a conversation about payments, and perhaps direct deposit account information:

[Attacker has access to Person A’s email account]
Person A: “Sounds good, are you ready to transfer funds?”
Person B: “Yes, can you send me your direct deposit information?”
[At this point, the attacker takes Person B’s message and deletes or files it, and responds on their behalf]
Attacker as Person A: “Yes, here it is.”

The attacker also sets up a mail rule so all emails from Person B are no longer visible to Person A; from this point on, Person B is corresponding with the attacker impersonating Person A. How long before they can tell? Do they deposit the information in the wrong account? Does Person A catch on and decide to call Person B?

Takeways:

  1. Your username and password protect your accounts and the information they contain; protect them by making sure they are long and hard to guess. Expect attackers are phishing you, so take phishing awareness training and if in doubt, pick up the phone and call the sender.
  2. Do not share sensitive, confidential or highly confidential information via email without password protecting it (and don’t put the password in email either!); the example above was direct deposit information but it could have been any password – e.g. Interact e-Transfer password. If your email account is compromised, sensitive information is visible to attackers and they could impersonate you to anyone you’ve corresponded with previously.
  3. Check each email, even replies to emails you have sent, for signs of phishing. If you see any suspicious behaviour, pick up the phone and call the person you are corresponding with to verify.

The above post was prompted by a real event which was fortunately detected by a recipient who spotted the signs of phishing and took action.

From the archives: An email exchange with the President (not really)

This piece was originally written by Nav Bassi on February 20, 2020, for the now-defunct UVic CISO Blog. Reposting here as much of the content remains relevant and is referenced by many of our posts on Phish Bowl.

The email warning banner service described below has since been superseded by newer security features. Nowadays, we recommend you keep an eye out for any warning banners that say that you don’t normally get emails from the sender–if you see that banner on an email claiming to be from someone within UVic, that’s a strong sign of an impersonation scam.


In late December 2019, we received a number of Gift Card Scam emails. These follow the usual pattern of impersonating someone in authority to compel someone else to purchase gift cards on their behalf and send them the codes electronically. Unfortunately, it is a common fraud and some of our colleagues have been victimized by these criminals.

The best defense to detect someone from outside of the organization impersonating someone from inside is to opt-in to our Email Warning Banner Service; this provides banner warning messages at the top of All External Emails and/or External Spoofed Email (email that claims to be from UVic based on the From: address, but the actual path the email took doesn’t match).

It’s also a good idea to verify requests that involve money, especially spending or transferring, by calling the supposed requester.

The Manager of our Information Security Office received one of these during the Winter Closure and decided to reply. It all began with a single email impersonating our President:

How are you ? Where are you? i need a little assistance from you

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

There are some obvious clues! For example, it is an odd email to receive. It doesn’t address the recipient by name, and the wording doesn’t reflect our articulate President. The signature is also odd, “Greater Victoria” looks like it was picked based on some Googling and not by anyone actually from the city. If you receive a message like this, your best options are to:

  1. Delete it (or click the Report Phishing button)
  2. Call the President’s office to verify the legitimacy of the message. Since it doesn’t contain any links or attachments, you could also inquire about it’s legitimacy with the Computer Help Desk.

Don’t do this, but our Manager decided to reply:

Hi Jamie.
I am doing super awesome! How are you?
I’d be glad to be of assistance. What can I do for you?
Eric

And got a quick response back:

I’m sorry for bothering you, I really do need your assistance with purchasing (Google Play gift cards) for my friend who is a cancer patient. I promised her a Google Play card as a birthday gift but I can’t do this right now. i tried purchasing it online but unfortunately all effort to no avail.

Wondering if you could get it from any store around you ? I’ll pay back asap. Kindly let me know if you can handle this.

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

Again, don’t do this, but our Manager continued the exchange:

She must be a really special friend for you to splurge on Google play gift cards. But maybe she’d like to be taken out for dinner or given an InstaPot – I hear they’re all the rage right now.
What store should I go to?

The instructions that came back are quick helpful and specific; clearly some more Googling has been done to see where gift cards can be purchased. It’s a common tactic; this person has done it before, and is probably corresponding with a number of other people at the same time. Note the instructions regarding sending a photo of the cards – this is the key: they need this information to redeem the value on the cards. This is how the theft occurs!

I’m checking…from what I can find out they are readily available at the following stores Walmart, Shoppers drug mart & Canadian tire value on google play gift card ($100 denomination) × 5 pcs= 500 CAD

As soon as you pick up cards, CAREFULLY Scratch the back of all 5 cards revealing pin on each card, then take a snap shot of the back of each card showing it’s pin and have photos attached and email me, so i can have it forwarded to her e-mail address. Keep me posted,
I owe you

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

Now our Manager is just having a little fun at the criminal’s expense:

I’m not sure where those stores are, but I’ll look them up. When do you need the cards by?
Why do you need pictures of the cards? I can just run them over to your office in person.
Aren’t you in your office?

Clearly the criminal does not want our Manager to take the gift cards to the actual President’s office…

You could just email me with the photos of card. soon as you pick them up.

i left office, would be back by tomorrow…how soon can you pick it up

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

How long will the criminal keep up the exchange? Our Manager responds:

I will head out to the store shortly and will email them to you when I get them.

The criminal responds:

keep me posted.

Our Manager is playing along:

Ok, I have a bunch of cards! I’m on my way back to the office. I’ll send you pictures when I get there.

Oops, looks like the criminal is getting impatient:

Still waiting

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

Our Manager provides a classic Canadian response:

Ok, sorry.

The last message of the exchange:

Hello
Could you please send me the photo attachment of the gift cards?
Thanks

President
Jamie Cassels
University of Victoria
Greater Victoria
British Columbia, Canada

Sent from my Device

Takeaways: Gift Card Scams and other forms of Business Email Compromise rely on trying to trick the recipient into believing the criminal is a trusted individual within the organization authorized to make whatever request is being made. The best way to defend yourself is to:

  1. Opt-in to our Email Warning Banner Service to give you a visual cue that the message is from outside the organization and/or it is misrepresenting itself from inside when it’s really outside***
  2. Pick up the phone and verify any and all requests that involve spending money or transferring funds.

***There are some legitimate situations where a message could be from outside the organization but represent itself as inside. For example, if you are using an external third-party mailing list service to email a newsletter, the email will come from the service outside of UVic but may have a UVic email address appear in the From: field to represent it as from a UVic sender. This is why we generate a banner to inform and empower the recipient instead of just blocking these messages.

Final thought: One of the reasons scams like this work is because they mimic our own practices. If we regularly ask our colleagues to purchase gifts cards via email, and also ask for photos of the redemption codes via email, then it is harder to detect this type of scam as unusual behavior. We should alter our practices to include, for example, telephone verification, so that it’s more difficult for someone to mimic our own practices. It is worth thinking about some of our activities that involve funds, and could therefore be a target for criminals, to see whether they are susceptible to fraud and how we can reduce this risk. Remember the old security saying: Trust, but verify.

Action Required: 334207-001-R1 571-379-0917

This email claims to be a document signing request from UVic. However, the sender (not shown here) was a long, partially randomized address from outside of UVic, which is the first red flag. The grammatical errors (especially the lowercase “victoria”) and the copyright footer’s erroneous reference to “University of victoria Corporation” are further signs that this email wasn’t actually from UVic. Hovering over the link will also reveal that its destination is not UVic or one of the cloud services that UVic has approved for university business.

Always look carefully at the email before you click on anything. Generally speaking, if the email doesn’t look quite right, it probably is a phish.

An error-filled phishing email claiming to be for a document from "University of victoria"

Signature-Required:University of victoria Resolution Document Completion Notice

Hi [redacted],

University of victoria Completed Document has been assigned to you for timely review and completion report.

File Name: University of victoria_Q4Remittance/Submission.pdf

Assigned To: [redacted]@uvic.ca

Open Document [link in big blue box]

Please take a moment to review this document for University of victoria.


Explore more with University of victoria

© Copyright University of victoria Corporation 2025.

Fake OneDrive email with no subject

Sometimes phishers send phish through OneDrive using compromised accounts, and other times they just create imitation OneDrive emails. This phish falls into the second category. Signs that this is not a real OneDrive file sharing notification include:

  • The sender is not from UVic or Microsoft
  • The “RECIPIENTS REAL DOMAIN LLC” banner is generic/placeholder content that wouldn’t be present on a real OneDrive email
  • There are errors in spelling (e.g., “Adjusment” and “Automatated”) and capitalization
  • Hovering over the link shows that it does not go to UVic or Microsoft
A fake OneDrive email from a non-Microsoft, non-UVic sender. The text is riddled with errors.

You don’t often get email from info@******centre.com. Learn why this is important.

RECIPIENTS REAL DOMAIN LLC

Uvic,

You have one New Document waiting on your OneDrive

Document Details

File:
5894 Adjusment to Fiscal Policies Q4.pdf
Size: 23.12kb
Date
September 01, 2025
Note:
You are required to review the shared document and advise accordingly

[Button/link: View on OneDrive]

3584059-359-6-46-492-693-02035

This is an Automatated OneDrive Communication. Do not reply to this mailbox.