Beware of fake CAPTCHA scams

Cybercriminals are using fake CAPTCHA pages to trick users into downloading malware or compromising their systems. While legitimate CAPTCHAs help websites verify that users are human, malicious CAPTCHA pages serve a different purpose: they create a false sense of security before leading users into a phishing attack, malware installation, or credential theft. This can be found on malicious websites, compromised legitimate websites or displayed by pop-ups. 

How to identify a fake CAPTCHA:

  • Legitimate CAPTCHA systems never require users to copy and paste text or commands into their browser or system.
  • Verify the website URL before you click.
  • They should never ask for login details, payment information or sensitive data.
  • Avoid clicking on pop-ups or links from unsolicited emails or while browsing the internet.

If you encounter a fake CAPTCHA, please reach out to the helpdesk or contact your IT support person.

Fake CAPTCHA instructing users to paste malicious content into Windows Run.

Complete these verification steps

To better prove you are not a robot, please

  1. Press & hold the Windows key + R
  2. In the verification windows, press Ctrl + V
  3. Press Enter on your keyboard to finish.

You will observe and agree:

I am not a robot – reCAPTCHA verification ID: 600245

Perform the steps above to finish verification [verify button]

Donation of Late Husband’s Gadgets to Students and Staffs

This is a variation of the free piano/welding machine/tool box scams. There are some slight differences though, usually they will include a reply to email address, in this case they replaced that with a phone number. This evasion tactic is to avoid email security detection methods and isolate the communication with the victim. They are also offering a large variety of items in an attempt to gauge more interest. In this type of scam they trick the victim into paying a shipping fee up front and no items are ever sent.

The usual red flags are present. Creating a false sense of urgency. The offer is too good to be true. The email is unsolicited from someone you don’t know or in some cases impersonating a UVic employee. The reply to phone number isn’t local, it’s from the US.

If you have responded to a scammer please contact the helpdesk or your IT support person immediately.

An email from a scammer falsely advertising free items

Subject: Donation of Late Husband’s Gadgets to Students and Staffs

Dear Staff and Students,

We are pleased to announce that Mrs. Annette Zall is currently in the process of downsizing and has graciously decided to offer her late husband’s beloved possessions for free to members of our community. The items available for grabs include a stunning Violin, an elegant 2014 Yamaha baby grand Piano, the iconic Eric Clapton’s 1939 Martin OOO-42 Guitar, a Leica S (TyR 007) Digital SLR Camera, Playstation 5, Xbox Series X – 2TB Galaxy Special Edition
2023 MacBook Pro 14 inch Laptop, Ipad pro 2023 11 inch, and a 2023 Apple Vision Pro. If any of these items catch your interest, we encourage you to contact Mrs. Annette Zall at <redacted>

Please note that a shipping fee will be required for the delivery of these items to your home. Act quickly as these items are in high demand and are sure to be claimed promptly. We appreciate your attention to this matter and thank you for considering these special items for acquisition.

Thank you for your time and consideration.

Sincerely.

Approved: See Completed EFT Payment (DocuSign scams)

Attackers do abuse legitimate services like DocuSign to send phish, commit spoofing, fraud or steal personal data.

Take note that the sender address is legitimate, dse_NA4@docusign.net. The body contains a 32 character security code in it, usual for a DocuSign email. If you scroll over the link, it also appears to be on DocuSign’s servers, however this could contain a redirect, sending you to a malicious website or download malware.

Red flags:

  • The sender name and email address contained in the body do not match. They are also very generic ie. james wood and mark harry.
  • The link contained in the email “_wildcard_.usentden***” is suspicous.
  • Grammatical error, the use of a capital letter in the middle of the sentence where it says, “These document(s) are related to the Completed transaction”.
  • If you do not recognize the sender, this should raise a red flag.

Reach out to the helpdesk if you have clicked on any links or provided any personal information to fake DocuSign emails like this.

Subject: Approved: See Completed EFT Payment
From: james wood via Docusign

james wood sent you a document to review and sign.
Review Document [by clicking on the review document button]

james wood
markharry[redacted]@outlook.com

These documents are related to the Completed transaction.

You can download these documents by clicking the links below.
_wildcard_.usentden[redacted]

Fake email quarantine phish

This phishing email pretends to be from Microsoft alerting the user that their UVic email has quarantined messages. You may see variations of this pretending to come from UVic tech support or something to that effect. It uses a false sense of urgency to try and trick you into clicking on the “View Messages” button. They use the Microsoft logo to try appear to be legitimate.

Here are some ways to recognize this as a phishing email:

  • Always check the sender address, in this case it was a phishing email address.
  • Urgent call to action creating a false sense of urgency.
  • The warning message “You don’t often get email from info@***.pe. This is an alert that this sender may be untrusted.
  • Poor grammar – “act now to release messages to avoid missing on important message.”

Remember to be cautious and never click on any link unless you are sure it is coming from a trusted source. If you are unsure reach out to the helpdesk or your support person.

Subject: You have high priority messages in quarantine

From: info@[redacted].pe

You don’t often get email from info@[redacted].pe. Learn why this is important.

Action required

  • User ID: [redacted]@uvic.ca
  • Date and Time Added: 1/13/2025, 9:12:53 PM
  • Message ID: 5 incoming messages are being held for your review.

Act now to release messages to avoid missing on important message. [By clicking on View Messages button.]

 

16.89% Salary Increase Letter 2024-11-19

This email tricks the user into clicking the link in the attached PDF. The link opens a Google form and requests the user to enter their username, password and Duo code. In this case the attacker is impersonating UVic payroll.

This one has the usual red flags:

  • Take note of the sender email address, it is not from a UVic account.
  • The salary increase, if it’s too good to be true, it usually is. 16.89% is far more than a typical yearly increase.
  • The password to open the PDF was in the same email.
  • There are spelling and grammar mistakes, “here-under” being a glaring one.
  • The use of homoglyphs, for example the word “NOTE”, have a look at the O in the example below and see if you can spot it.

If you clicked on the link reach out to the computer helpdesk or your support.

Fake salary increase phishing email

Subject: 16.89% Salary Increase Letter 2024-11-19
From: University of Victoria <[redacted] @***e.edu
Attachment: PDF with file name UVIC Salary- Audit Nov

You don’t often get email from [redacted]@***e.edu. Learn why this is important

Dear Αll,

Sequel to lαst week notificαtion, find enclosed here-under the letter summαrizing your 16.89 percent sαlαry increαse starting 2024-11-19

Αll documents are enclosed here-under:

NΟTE: Your Αccess is needed to go through the sαlαry increment letter, Initiαl Αccess is Salary
Pαyroll & Employee Relαtions