Information Systems & Technology (IST) has detected an increase in malicious email known as “Imposter email threats” on campus.
What is it?
- Imposter email threats are a class of financial phishing email where the sender of the email is pretending to be a senior executive of an organization
- Known as “business email compromise” and “CEO fraud”
How does it work?
- The imposter will target employees at the institution requesting an urgent payment or wire transfer be made
- The imposter may claim to be indisposed (e.g. at a conference, in a meeting) and making the payment in this fashion is, as a result, the only way
- Email replies from the recipient to the imposter will be answered
Imposter email threats at Waterloo
Actual threats received to date have used the name of one of the University’s leadership. These emails will usually show a valid display name (i.e. who the email is from), but will use an off-campus address.
Be sure to verify the sender’s email address before replying to any suspicious email.
There may be different ways to check the from address of a suspicious email, depending on the email client being used. Some common methods include:
- Review the display name
- It may show the suspicious email address, not an actual name
- Hover your cursor over the email display name
- You may then need to hover over the envelope icon
- Click the (circle) icon beside the sender’s display name and view their contact card, as shown here
Are you an easy target?
Checking and replying to email from our mobile devices, while convenient, may encourage us to react more immediately to the urgency of the imposter email. It is also almost impossible to verify the sender's email address from a mobile device. Confirm the sender and the request before reacting.
Have you been targeted?
If you believe you have been a target of Imposter Email or some other form of financial phishing, please contact the Information Security team by email at firstname.lastname@example.org or by telephone at ext. 41125.
When forwarding email samples, please follow these directions to ensure the team receives the detailed information required for analysis.