Phishing

Security

24 sections
500 source tickets

Last synthesized: 2026-02-13 00:39 | Model: gpt-5-mini
Table of Contents

1. Phishing emails impersonating services or soliciting credential confirmation

276 tickets

2. Legitimate external marketing or service notifications flagged as phishing

102 tickets

3. Suspicious attachments and files saved from mobile or cloud

6 tickets

4. Filtering/quarantine failures and high‑volume phishing outbreaks

8 tickets

5. Browser push notification phishing with fake antivirus/Edge popups

23 tickets

6. Clicked Outlook group link produced 'folder cannot be added' error and raised phishing concern

6 tickets

7. Suspicious search-result redirect through third‑party domain that landed on a legitimate site

1 tickets

8. Phishing impersonating AI/chatbot service update (ChatGPT-themed email)

5 tickets

9. Internal‑identity impersonation requesting private contact (WhatsApp)

12 tickets

10. Financial‑themed phishing requesting payroll or payment confirmation and bank details

8 tickets

11. External promotional newsletters and webinar invites reported as phishing (tracked links)

7 tickets

12. Unsolicited commercial offers and list‑selling solicitations blocked after report

9 tickets

13. Invoice-style email with attachment reported as suspicious and blocked

9 tickets

14. Fake password update request with attachment prompting validation

1 tickets

15. Microsoft OneDrive notification flagged as phishing but verified legitimate

1 tickets

16. Phishing email impersonating Teams/OneDrive about deleted meeting recording

2 tickets

17. Unexpected 'Connect' popup blocking access to Oasis

2 tickets

18. Accidental system configuration change sent outdated/no-reply emails to students

1 tickets

19. Phishing link flow that collected an email then triggered automated Salesforce confirmation codes

1 tickets

20. Unsolicited summary requests arising from third‑party meeting transcription (Otter.ai) or guest admissions

2 tickets

21. Legitimate Salesforce account-change or sandbox notifications flagged as phishing

10 tickets

22. Repeated informational/phishing-alert emails due to duplicate distribution-list entries

1 tickets

23. Clicked phishing link or opened phishing email — account containment and recovery

6 tickets

24. Account recovery when password-reset email may be phishing — alternate-email reset delivery

1 tickets

1. Phishing emails impersonating services or soliciting credential confirmation
95% confidence
Problem Pattern

Unsolicited external email, calendar or Teams invitations impersonated internal services, vendors, known contacts or consumer brands and attempted to elicit credentials, identity confirmations, payments or personal details. Messages commonly contained embedded links, tokenized portals, redirector chains (for example aka.ms and consumer de‑redirectors), attachments (PDF, DOCX, .eml) or hosted landing pages (including public AWS S3 buckets); recipients observed external‑sender warnings, 'you don't often receive emails from…' notices, OAuth/consent prompts, quarantined or inaccessible meeting invites, or were asked to reply or enter credentials. Affected systems included Outlook (desktop/web), Exchange/Exchange Online, Microsoft Calendar, Teams, Microsoft Forms, third‑party apps and consumer mail providers; users reported credential entry on phishing pages, identity anomalies, disappearing links, or social‑engineering replies.

Solution

Phishing reports were triaged from Phish Alert, Outlook Report Message/web reports, helpdesk and third‑party app queues; helpdesk accepted reports for shared mailboxes and app objects when UI reporting failed. Analysts examined mail headers (SPF, DKIM, Return‑Path, MTA hops), sender reputation, full link destinations and redirect chains (including aka.ms and consumer de‑redirector variants), and expanded tokenized portals (MS Forms, mailanyone, bill.com, Adobe Sign) to cross‑reference invoice/case IDs and marketing streams. Redirector families (for example sendibt2/sendibt3), tracking/analytics calls (api.mixpanel.com, api.telegram.org), telephone numbers, social links and wallet addresses were recorded as indicators; investigators also noted hosting platforms used for phishing landing pages, including public AWS S3 buckets. Attachments and rendered payloads (.eml, DOCX, PDF, images, audio) were examined in isolated sandboxes or from mailstore copies; AV/Windows Defender scans were performed and manual rendered views or screenshots were preserved when pages or links became inaccessible after interaction. For inaccessible pages or short‑lived content, investigators preserved screenshots, expanded URLs, mail headers, timestamps and user statements and recorded inconsistent spam‑filter verdicts observed during triage. Third‑party reputation and scam‑detector services were consulted and bulk samples were submitted to Microsoft when escalation was required. Mail gateway controls, deny/blacklists and quarantine workflows were used to block malicious senders, domains, redirectors and calendar/Teams origins; common mitigations included blocking at the gateway, quarantining or deleting malicious messages from mailboxes, and logging automated removals triggered by the Phish Alert workflow. When meeting invites or calendar events were quarantined, investigators verified envelope‑from versus display‑from, inspected quarantine metadata and headers to identify true origin, and coordinated admin or vendor support for quarantine release when users could not self‑release items. Mail, web and identity provider logs (Okta/Azure AD/Entra) were queried to identify users who clicked links, called numbers, followed SMS links, or granted application consent; when compromise was suspected accounts were monitored and passwords were reset and OAuth consents revoked. Endpoints where links or attachments were accessed were scanned and monitored for follow‑on alerts. Phishing content embedded in third‑party systems (for example Salesforce cases) was removed where possible and application owners were coordinated with when objects could not be deleted. Sextortion/extortion and abusive messages were treated as spam/abuse, blocked and logged with wallet addresses and extortion indicators recorded. Recurring IOCs and redirector patterns (consumer de‑redirectors, mailanyone portals, bill.com/PayPal invoice tokens, aka.ms short links, notion.site redirects, sendibt2/sendibt3 redirectors, api.telegram.org exfiltration calls) and reporting workflow issues (shared‑mailbox reporting limitations and Report Message UI disappearance behavior) were documented. For suspected exposure of personal addresses, public social profiles and breach‑check services (haveibeenpwned) were reviewed to identify likely exposure vectors and correlate personal and corporate addresses when present. Account‑creation or identity‑confirmation emails that requested confirmation before provisioning were treated as credential‑phishing vectors and preserved as artifacts when reported. For security‑awareness events, investigators confirmed simulation status when applicable, communicated confirmations to users, provided example phishing messages on request, and recorded simulation enrollments in ticketing/audit logs.

Source Tickets (276)
2. Legitimate external marketing or service notifications flagged as phishing
95% confidence
Problem Pattern

System-generated external notification emails (marketing blasts, transactional/booking confirmations, training reminders, third‑party forms/surveys and domain‑claim/federated notices) were quarantined or flagged as phishing, causing messages to be withheld or displayed with warnings. User‑reported symptoms included quarantine summaries or inability to open messages from quarantine, an external‑sender banner such as "CAUTION: This email originated from outside the organization", infrequent‑sender/anonymous‑form warnings, tokenized/SafeLinks URLs, blocked inline images, expiring one‑time confirmation links, and 'Phishing'/'Unsafe' assessments. Affected systems included Microsoft 365/Exchange/Outlook (classic and new clients), email security gateways, Postfix/OpenDKIM and third‑party sending platforms (for example Salesforce/Marketing Cloud, Amazon SES, CleverReach, KnowBe4).

Solution

Investigators confirmed sender legitimacy before releasing legitimately generated notifications and recorded delivery paths and findings in mail logs and quarantine records. Forensic steps included MTA/header analysis to trace authenticated SMTP deliveries (SASL username and source IP), enumeration of sending IPs and SMTP envelope addresses, and inspection of SPF, DMARC and DKIM results; header rewriting and local DKIM signing (for example OpenDKIM/mx1) were recorded as common causes of DKIM signature mismatches. Inconsistent DMARC alignment for third‑party sends (notably Amazon SES and other mail services) and misconfigured external provider servers were recurring causes of quarantines and were escalated to vendors when observed repeatedly. Administrators released messages from gateway or Exchange quarantine when validated; where the quarantine UI failed to request or release a message, cases were escalated for specialist manual release. Tokenized tracking links and SafeLinks‑wrapped URLs were reproduced or unpacked to verify redirected targets, and one‑time/expiring confirmation links were validated with the originating service (examples included security‑awareness/training notifications delivered via KnowBe4 and marketing vouchers such as Wunschgutschein). Outlook client differences were noted — the new Outlook client could surface external/safety banners and block inline images for previously received messages — and recipients were informed when messages were legitimate. Attachments and PDFs were scanned with antivirus/antimalware tools and document details were cross‑checked against internal customer/payment/record systems when relevant. Final outcomes and the rationale for release (delivery path, header/DKIM/SPF/DMARC results, and any vendor escalations) were documented in mail logs and quarantine records to explain the behaviour to affected users.

3. Suspicious attachments and files saved from mobile or cloud
85% confidence
Problem Pattern

Users received external emails or Teams posts containing attachments or links to third‑party large‑file download services (for example ShareFile or mail.163.com) or files with spoofed extensions (.eml, .svg, .html). Symptoms included unexpected or unreadable saved files, files appearing in Downloads without notification, unsolicited application launches (for example Outlook opening .eml), external‑origin caution banners, and recipients uncertain whether links or attached PDFs were safe to open or download.

Solution

Investigators inspected message headers, attachment and message metadata, and client behaviour to reproduce how files were saved. Suspicious artifacts — including .eml, .svg and HTML‑spoofed files, invoice attachments, PDFs, and cloud large‑attachment download links such as ShareFile and mail.163.com — were submitted to the organisation's spam and anti‑malware scanning service and scanned; endpoints were scanned when appropriate. Where a cloud download link or attachment was plausibly legitimate but unexpected it was flagged for deletion and the sending address was blocked if the message remained suspicious. Saved files that posed risk were removed from devices and incidents were logged. In one case a staff member downloaded a PDF attachment locally, scanned it, and resent the file separately to the requester after review; in another a ShareFile link was assessed as plausibly legitimate but recommended for deletion if the recipient had not expected it. When attachment behaviour could not be reliably reproduced investigators recorded findings, scanned available samples, and advised deletion of the message and any saved files; incidents were closed after scanning and assessment.

4. Filtering/quarantine failures and high‑volume phishing outbreaks
90% confidence
Problem Pattern

Large-scale phishing waves caused spikes in user-reported messages and delivery/quarantine anomalies in Microsoft Defender for Office 365 / Exchange Online. Messages often contained malicious links or attachments, impersonated internal senders, or used legitimate third-party hosts (for example, Salesforce) to host credential-capture pages; observed symptoms included quarantined items reappearing in inboxes, unusually high outbound mail volumes from specific accounts, persistent unauthorized external mailbox forwarding, and downstream financial fraud. Investigations were sometimes hindered by user reports that lacked message samples or indicators, preventing technical analysis.

Solution

Investigators first triaged whether incidents were due to provider-side filtering/quarantine errors or account compromise. For provider-side quarantine failures, vendors corrected quarantine behavior so malicious items were retained instead of being re-released and vendor escalations were documented. Reported messages were classified as phishing and malicious URLs — including third-party hosted case/form links — were blocked at tenant/URL block levels; attacker infrastructure was reported to hosting providers and takedown services. Users, including impacted student populations, received broad communications discouraging interaction with suspicious messages, advising verification of sender identity, and were directed to use Outlook’s Report function and the Report Message add-in where available to surface suspicious mail. For account-compromise incidents, affected accounts were disabled or contained, persistent malicious mailbox forwarding rules were removed and external forwarding targets were blocked, compromised credentials were rotated, active sessions were revoked, and MFA was enforced or re‑issued. Outbound abuse and sent-item artifacts were cleaned or isolated and high-volume outgoing activity was throttled or blocked during remediation. Targeted follow-up was performed for accounts that engaged with links or attachments and instances of downstream financial fraud were escalated to banks and investigators. Quarantine review, URL/tenant blocking, vendor corrections, removal of forwarding persistence, credential/session/MFA remediation, outbound cleanup, user notification, and escalation to external hosts/banks resolved the exposures and supported post-incident documentation. Separately, multiple user reports lacked message samples or indicator details; virtual agents requested additional information but, when none was provided, tickets were recorded as closed "Won't Do" and no technical remediation was performed for those reports.

5. Browser push notification phishing with fake antivirus/Edge popups
79% confidence
Problem Pattern

Users received persistent browser push notifications that impersonated antivirus or Windows/Edge alerts (e.g., Avira, McAfee, Norton, Windows Defender). Notifications recurred at short intervals (sometimes as fast as every second), persisted after dismissal or closing the originating tab, opened scam webpages when clicked, and in some cases interacting with the notification triggered rapid-fire popups. Affected systems were Microsoft Edge and Chrome on Windows desktops/laptops (including Windows 11); users reported degraded application performance and occasional failures or delays installing Office/Outlook or running endpoint scans (scans sometimes showed no progress).

Solution

Investigators classified incidents as browser push-notification phishing (not host compromise) using web telemetry and browser/source attribution. Remediation actions that resolved the incidents included blocking malicious sending domains at the web filter/gateway and in corporate DNS where possible, and removing the offending origin from browser site entries and push-notification permissions. Edge-specific remediation included deleting the site entry and clearing site content/notifications; Chrome remediation included disabling push notifications for the origin and clearing site data. Microsoft Defender quick and full scans and central monitoring returned no detections and showed no installed payload in investigated endpoints. On endpoints without administrative rights, remediation prioritized network-level domain blocks and removal of browser permissions/site data. Support advised affected users that the alerts were phishing, instructed them not to install software or enter credentials on pages opened from those notifications, captured screenshots and evidence for investigation, and published intranet/SharePoint/Teams guidance. New observation: at least one user-click interaction with a notification produced rapid, repeated popups (~1 per second) and a support-initiated disk/virus scan in that case appeared to stall (no progress for ~1 hour); investigators noted the stalled scan but did not find installed malware. After blocking malicious domains and clearing browser notification permissions/site data, fraudulent push notifications ceased and application performance returned to normal; previously failing installations completed successfully when retried in observed cases.

6. Clicked Outlook group link produced 'folder cannot be added' error and raised phishing concern
90% confidence
Problem Pattern

Outlook users experienced errors when interacting with group links, messages, or add-ins: clicking “View group in Outlook” produced an error that the folder could not be added, and the Phish/Phish Alert Report button in Outlook failed to submit reports (either showing an error dialog or silently not reporting). Failures occurred in Outlook with Office 365 add-ins and were sometimes correlated with transient Microsoft/Office365 service interruptions. In at least one incident, accessing Salesforce from Outlook prompted an unexpected consent dialog.

Solution

Support verified that the messages, links and groups involved were legitimate and not malicious. For the Outlook folder-add error, the technician ran a Windows Defender full system scan (Settings > Update & Security > Windows Security > Virus & threat protection > Scan options > Full scan) and confirmed no malware related to the incident. Failures of the Phish/Phish Alert Report button were resolved either after external Microsoft/Office365 service interruptions cleared (users retried and reporting returned) or by server-side fixes applied by helpdesk/Cyber Security Services; in each case the add-in’s functionality was restored and users were asked to retry reporting. A single incident recorded an unexpected Salesforce consent prompt when accessed from Outlook; no remediation details for that prompt were recorded in the ticket.

7. Suspicious search-result redirect through third‑party domain that landed on a legitimate site
85% confidence
Problem Pattern

User clicked a likely fake Google search result which redirected through a suspicious intermediate domain (e.g., brnok.check-tl-ver-297-4.com) before landing on a legitimate site (amazon.de). No error messages or immediate alerts occurred and the workstation remained functional, but the user was concerned that the redirect may have delivered malware or caused a compromise. Affected systems: web browser, Google Search results, Windows (Defender).

Solution

Support verified the final landing domain was an Amazon page and judged the event to be most consistent with an advertising/redirect chain rather than an active compromise. There were no Defender alerts or observable signs of infection and the user reported normal system operation. Support advised running a full Windows Defender scan if any suspicious files or programs had been opened and to report any subsequent unusual behavior; no indicators of compromise were identified during the investigation.

Source Tickets (1)
8. Phishing impersonating AI/chatbot service update (ChatGPT-themed email)
61% confidence
Problem Pattern

Users received emails impersonating an AI/chatbot service or internal governance team that demanded a mandatory “Secure ChatGPT Update” via an expiring link (commonly 48 hours) and threatened to block access. Sender addresses often used redirect-looking or non‑IU domains (for example management@iu.de-redirect.com) rather than official internal addresses. Messages arrived in Outlook desktop and Outlook Web and sometimes appeared through link‑preview services (e.g., Jira); content was occasionally bilingual (German/English) and used urgent compliance pressure. Recipients reported clicking links or entering Okta credentials and raised concern that link previews or third‑party previews may have generated outbound requests.

Solution

Incidents were classified as phishing attempts impersonating ChatGPT or an internal governance update. Investigators removed or quarantined the suspicious messages and blocked the specific senders, redirect-like sender domains, and similar message patterns at mail filters. Where users reported possible credential entry, the impacted Okta accounts had passwords reset and active sessions revoked. User devices underwent Windows Defender full scans, which did not identify malware or persistent compromise. Investigators evaluated link‑preview activity (including Jira/other preview services) and included preview-related URLs in the blocking rules. A targeted advisory describing the phishing characteristics (impersonation of AI/internal teams, expiring/urgent links, threats of blocked access, redirect-looking sender domains, bilingual content in some cases, and link‑preview risks) was distributed to relevant staff, and users were instructed to report suspicious messages using the corporate phishing report flow.

9. Internal‑identity impersonation requesting private contact (WhatsApp)
91% confidence
Problem Pattern

External emails impersonated internal colleagues by using the colleague's displayed name/signature while originating from external or spoofed addresses (for example, consumer Gmail). Messages frequently triggered external‑sender warnings and spam/virus‑scan headers and were observed in corporate email systems, mail gateways, spam/virus scanning pipelines, phishing‑reporting tools, and in some cases third‑party inbound queues such as Salesforce. Users reported uncertainty about legitimacy and concern that the messages were social‑engineering attempts to harvest private contact details (e.g., WhatsApp numbers).

Solution

Affected users reported the messages through phishing‑reporting tools or directly to IT. IT Security reviewed message content and headers (including external‑sender warnings and spam/virus‑scan results), determined the sender addresses were external and the requests were likely social‑engineering/contact‑harvesting attempts, and blocked the external sender addresses at the mail gateway to prevent further delivery. Users were informed that the messages were malicious and were advised to delete them. In at least one matched case the spoofed message had been routed into a Salesforce inbound email queue; the presence of the spoofed inbound record was noted though no CRM‑specific remediation was recorded in that ticket.

10. Financial‑themed phishing requesting payroll or payment confirmation and bank details
90% confidence
Problem Pattern

External emails impersonating banks, payroll/invoicing/payment services or private individuals solicited recipients to confirm/update bank/payment details, accept unexpected funds, or act as beneficiaries for large transfers. Messages commonly originated from spoofed or free webmail addresses (Gmail) or impersonated domains, included fabricated transaction/order IDs or large-sum inheritance/contract claims, and carried external-origin banners, multilingual/legal boilerplate, and spam/virus-scan footers; no system error codes were present. Users reported the messages via Phish Alert or the helpdesk and expressed uncertainty about legitimacy.

Solution

Reported messages were reviewed by IT Security and classified as financial-themed phishing, including payment-confirmation impersonations and advance-fee/‘419’ inheritance or contract-fund scams. Analysts noted common indicators across reports: fabricated transaction or order IDs, large-sum inheritance/contract claims, requests for bank/account details or to act as beneficiary, requests for phone/fax contact, multilingual/legal boilerplate, spam/virus-scan footers and mailanyone.reportspam links, external-origin warning banners, and senders using spoofed domains or free webmail (e.g., Gmail). Incidents were processed through the Phish Alert reporting workflow or HelpDesk intake; IT Security acknowledged reports, reviewed message headers/bodies, and treated them as malicious. Containment actions included blocking the offending sender addresses at the mail gateway/spam filter and adding them to blocklists (some tickets recorded attempted blocks where blocking was applied at gateway/filters), instructing reporters to delete the messages, and monitoring mail deliveries for recurrence. Systems involved were the corporate mail gateway/spam filter, antivirus scanner, Phish Alert reporting tool, mailanyone spam portals noted in message footers, and the IT HelpDesk. No system error codes were observed, and monitoring showed no further deliveries from blocked senders before tickets were closed.

11. External promotional newsletters and webinar invites reported as phishing (tracked links)
93% confidence
Problem Pattern

Users received unsolicited external promotional emails (newsletters, Substack posts, webinar or event invites with RSVP links) that displayed external-origin warning banners and contained tracked or redirect links. Recipients were unsure whether links were malicious and reported the messages via the Phish Alert button. No malware indicators or error codes were present; affected systems included corporate email clients, mail gateways, and spam/virus filtering tools.

Solution

IT inspected message headers and content and classified the reports as commercial marketing or spam rather than credential‑harvesting or malware. Phish Alert reports were closed after classification. Where users reported recurring or unwanted messages, IT added the sender or domain to the mail gateway/spam‑filter blocklist to reduce further deliveries. Users were informed the items were legitimate commercial mailings or tracked newsletter/event content and were told to delete unwanted messages or use the mail footer "report this email" link to feed spam filters. Helpdesk staff processed the reports and marked the tickets resolved.

12. Unsolicited commercial offers and list‑selling solicitations blocked after report
88% confidence
Problem Pattern

Users and staff received unsolicited external contact attempts across channels (email, automated lead ingestions, and inbound telephone calls). Email symptoms included external‑origin banners, unfamiliar sender accounts, messages with attachments or links, and Mail Delivery Subsystem/DSN bounces (for example, "DNS type 'mx' lookup ... responded with code SERVFAIL") consistent with backscatter. Automated lead ingestion via Twilio/myStudium produced high volumes of fake leads; telephone callers asserted vendor or contractor relationships and supplied unverifiable phone numbers or contact lists. Affected systems included inbound email and telephony, spam filters/gateway, Phish Alert/report‑spam, myStudium/Twilio, Salesforce, mailer‑daemon/DSN workflows, and internal contact/vendor directories; users reported uncertainty about legitimacy and operational disruption from volume or harvesting attempts.

Solution

IT reviewed reported items and classified them by channel and risk: unwanted solicitations, likely scams/phishing, misaddressed messages, or unverifiable cold calls. For email reports, messages with attachments were treated as suspicious and not opened; such messages were deleted and senders were blocked at the mail gateway and on spam filters to stop further deliveries. Reports containing links were investigated by inspecting the linked URLs and sender account activity; messages whose linked sites and sender histories indicated benign but unrelated contacts were recorded as misaddressed and removed, while sender accounts showing single‑send patterns or other anomalies were flagged as potentially compromised. Mail Delivery Subsystem/DSN notices showing errors like “DNS type 'mx' lookup ... responded with code SERVFAIL” were identified as backscatter from invalid recipients rather than new legitimate deliveries. For high‑volume fake leads delivered via Twilio into myStudium, operators added patterned email addresses and domains to the Twilio/myStudium spam filter and blocklist, enabled monitoring to confirm that new leads matching the pattern were blocked, and recorded that previously ingested fake leads remained and required manual closure; Salesforce lead origins were checked when relevant. For inbound telephone reports, staff returned the provided numbers, attempted call‑backs, and spoke with the caller where possible to review claimed relationships; internal contact lists and vendor‑management records were searched and most claimed contacts could not be verified, so the calls were treated as unverified cold calls and documented in the ticket. All investigative actions, rationales, any mailbox/gateway blocks, and phone numbers or vendor information were recorded in the ticketing system; reporters were informed of the classification and advised to continue using Phish Alert/report‑spam or to contact HelpDesk/IT Security if uncertain.

13. Invoice-style email with attachment reported as suspicious and blocked
91% confidence
Problem Pattern

Users received unexpected external invoice- or payment‑style emails with attachments (subjects such as 'OVERDUE INVOICE', 'PAY-REF...', 'Document Purchase Order', or 'Payment specification'). Messages sometimes consisted only of an attachment and displayed external‑sender warnings; recipients were often BCC'd and message bodies contained generic placeholders such as '[Invoice Number]'. Attachments were flagged by anti‑malware/spam scanners and inbound gateway headers (for example, Mimecast) appeared on the messages.

Solution

IT Security reviewed reported messages and treated them as phishing. Triage noted indicators such as generic placeholders (for example, '[Invoice Number]') and mass BCC recipients, and gateway headers (Mimecast) were recorded. Inbound mail gateway and spam filters were updated to block the sender address and/or domain to prevent further deliveries; one sender was identified as originating from an Oracle Cloud workflow email service and was blocked. Attachments were subjected to standard anti‑malware and spam scanning during review and no additional indicators of compromise were found. Reporters were informed the messages were malicious or suspicious, were advised not to open attachments and to delete the emails, and incidents were closed after blocking the sender and confirming no further indicators.

14. Fake password update request with attachment prompting validation
92% confidence
Problem Pattern

An external email claimed a "New Password Update Request" for a corporate mailbox and included an attachment/link prompting the recipient to validate the request. The message contained social‑engineering content (unsolicited password-change notice, odd text like "Limit Left 2") and was reported as phishing.

Solution

IT/Security analyzed the submission, confirmed it as a phishing attempt, and blocked the sender/address to prevent further deliveries. The user was instructed to delete the email and the ticket was resolved after the block was applied.

Source Tickets (1)
15. Microsoft OneDrive notification flagged as phishing but verified legitimate
96% confidence
Problem Pattern

A recipient reported an email notifying them that files deleted from OneDrive were permanently removed after 93 days. The message displayed the external‑origin banner and the user was unsure if it was a genuine Microsoft notification or a phishing attempt. Systems involved were Microsoft 365 OneDrive/SharePoint and corporate email.

Solution

IT reviewed the message and confirmed it as a legitimate Microsoft OneDrive/SharePoint system notification rather than phishing. The user was advised to check the OneDrive/SharePoint recycle bin for restorations (items recoverable within 93 days) and to contact HelpDesk if further assistance was required.

Source Tickets (1)
16. Phishing email impersonating Teams/OneDrive about deleted meeting recording
91% confidence
Problem Pattern

Users received unexpected email notifications claiming a meeting recording had expired, been deleted, or was available for restore, frequently referencing meeting or file services (for example Teams, OneDrive, or Zoom). Messages contained links such as 'Go to recycle bin' or restore links, originated from external senders, and appeared plausibly legitimate though recipients did not expect a recording.

Solution

IT Security reviewed reported messages and classified them as phishing impersonating meeting/collaboration recording services (examples observed: Teams, OneDrive, Zoom). Messages were externally originated and used plausible restore/recycle-bin links to attempt credential capture or malware delivery. The senders/addresses were blocked at the mail gateway to prevent further deliveries. Reporters used Outlook's 'Report phishing/suspicious email' functionality (Microsoft Defender for Office 365) to escalate messages; reporters were instructed to delete the emails. Incidents were closed after classification and gateway blocking to prevent recurrence.

Source Tickets (2)
17. Unexpected 'Connect' popup blocking access to Oasis
75% confidence
Problem Pattern

Users reported unsolicited authentication/login prompts or “Connect” dialogs that appeared without user interaction and blocked access to applications (examples: Oasis web app and Self Service+ on macOS). Prompts typically lacked error codes or detailed messages and in some cases were non-dismissible, causing users to suspect phishing. Affected systems included browser-based apps and the macOS Self Service+ portal.

Solution

Technicians confirmed that unsolicited authentication prompts were legitimate in the reported incidents and that authenticating restored access to the affected application (for example, clicking the “Connect” prompt returned Oasis access). In a macOS-specific case, IT identified and repaired a defect that had prevented the Self Service+ sign-in window from being closed; staff informed the user that Self Service+ is the Mac software portal and that they should sign in with their normal IU login credentials when prompted. Access or window behavior was restored following authentication or the bug fix, and the resolution was confirmed with the users.

Source Tickets (2)
18. Accidental system configuration change sent outdated/no-reply emails to students
95% confidence
Problem Pattern

Multiple students and staff received out-of-context or outdated emails from the institution's no-reply address after a recent change in the Care system. Messages appeared legitimate but were not intended for the recipients; recipients reported the emails as suspicious. There were no indicators of account compromise or external intrusion in initial triage.

Solution

Investigators traced the unexpected messages to a configuration setting in the Care system that had been accidentally overwritten during a deployment. The activity was confirmed to be a configuration error rather than a security breach. Affected students were notified about the incident, the Care configuration was restored, and deployment/process controls were tightened to prevent the same overwrite from recurring.

Source Tickets (1)
19. Phishing link flow that collected an email then triggered automated Salesforce confirmation codes
70% confidence
Problem Pattern

Recipients clicked a phishing link that requested an "allowed email address" and then triggered an automated Salesforce confirmation code sent to that address. Users who entered the code were redirected to a page offering a downloadable voicemail/message; some users only opened the link. The sender impersonated a partner but was later confirmed not to be affiliated.

Solution

The investigation determined the interaction was an automated phishing flow rather than a legitimate partner message. Delivery analysis showed seven related emails were involved, with two blocked by mail filters and five delivered to recipients. Recipients who completed the confirmation flow were redirected but did not download any files, and no account compromise was detected. Messages from the fraudulent sender were blocked/removed during remediation and the incident was closed after verification of no compromise.

Source Tickets (1)
20. Unsolicited summary requests arising from third‑party meeting transcription (Otter.ai) or guest admissions
90% confidence
Problem Pattern

Users reported unexpected external participants or third‑party transcription prompts tied to Microsoft Teams/ILSE sessions and subsequent unsolicited contact. Symptoms included emails/messages asking attendees to enter their university email to receive a session summary, or messages alleging that session recordings were used to create AI‑generated images that linked the university identity to a private email. Affected systems included live Teams/ILSE sessions and recordings in myCampus, attendee email, and third‑party services (e.g., Otter.ai, Midjourney, Discord). Recipients treated the contacts as suspected phishing, impersonation, or privacy incidents.

Solution

Investigations checked Teams/ILSE session guest lists, transcription/summary service activity, and myCampus recording access logs. In cases where unknown guests or third‑party transcription prompts were sending summary requests, activity was attributed to third‑party transcription/summary services (for example Otter.ai) and/or external guests admitted to the session; no evidence was found of a compromise of university systems, the events were documented as third‑party generated activity, and the incident was closed after confirming source and scope. When a user alleged that ILSE/myCampus recordings had been used off‑site (for example to generate images on Midjourney or to contact them via Discord) and claimed linkage of their IU identity to a private email, the report was escalated to IT Security and Data Protection for privacy and forensic review; at the time of reporting there was no confirmed unauthorized access of university systems. Incidents were recorded with relevant context (session metadata, guest lists, recording IDs) to support any further privacy or security investigations.

Source Tickets (2)
21. Legitimate Salesforce account-change or sandbox notifications flagged as phishing
90% confidence
Problem Pattern

Users received unsolicited Salesforce-related emails requesting account email-address changes or sandbox/service notifications containing links to Salesforce cases. Messages sometimes appeared legitimately sourced (e.g., qa_support@salesforce.com) yet looked 'phishy' — for example showing expiring change links (commonly 72 hours) or displaying placeholder/invalid current addresses (e.g., ...@iu.org.invalid or addresses with 'uat' suffixes). Recipients also reported automated notices from backend distribution or Azure AD dynamic account-management groups that appeared empty or inaccessible, unfamiliar sender or group names, unexpected links, and uncertainty whether accounts were compromised. Affected systems included Salesforce production and sandbox instances, institutional email, Azure AD groups, and vendor/managed-device notification systems.

Solution

Support inspected sender addresses, message headers, and message context and confirmed that reported items were legitimate administrative or service-generated notifications rather than phishing in the investigated cases. Investigations verified Salesforce-generated account-email-change messages (for example from qa_support@salesforce.com) and identified that such messages routinely included time-limited change links (commonly a 72-hour expiration) and could display placeholder or invalid current addresses (for example addresses ending in .invalid or test/UAT addresses) when the Salesforce account or instance was configured with a non-production or placeholder email. Multiple unsolicited or repeated email-change requests were escalated or forwarded to the Salesforce specialist/business team for further investigation. Support also identified backend distribution and Azure AD dynamic account-management group notices (for example IUG-DYN-All-IU-Staff-IUHochschule-Employees-Excluded) that were triggered by administrative membership automation, often presented as empty or inaccessible to standard users, and were intended for administrative audiences. Vendor or management-tool notifications (for example managed Lenovo firmware-update messages on institutional devices) were validated as legitimate device-management traffic. When a Salesforce message pertained to an environment not administered by central IT, support confirmed they lacked instance access and directed the reporter to the owning SalesTech/business team or the Sales & Service Tech Portal (Jira Service Management) for in-product handling or blocking. Support advised reporters that messages they had not acted on could be treated as suspicious until validated, and accepted reports into Outlook/Exchange reporting workflows before closing the incidents.

22. Repeated informational/phishing-alert emails due to duplicate distribution-list entries
80% confidence
Problem Pattern

Recipients reported receiving the same phishing informational email 20–25 times; the symptom was multiple duplicate notification emails delivered to the same person.

Solution

The case was escalated to the communications team, which investigated and found that recipients had multiple enrollments in UPS courses causing duplicate entries in the mailing distribution; the communications team recorded the issue and planned adjustments to the mailing process to deduplicate recipients so each person would receive the information only once.

Source Tickets (1)
23. Clicked phishing link or opened phishing email — account containment and recovery
85% confidence
Problem Pattern

Users clicked links or opened emails suspected of phishing; some entered credentials into cloned login pages while others only opened external pages. Symptoms included OKTA/Azure AD re‑authentication prompts, unexpected Teams/OKTA re‑auth requests, account lockouts, inability to sign in, or user‑reported credential exposure. Some incidents originated from third‑party/vendor messages (including vendor breaches) or from stale/non‑loading links that raised malware/background‑activity concerns and potential exposure of address‑book or customer data. Affected systems included OKTA/OKTA‑Verify, Azure AD/Microsoft accounts, Outlook, Teams, and intranet access.

Solution

Incidents were handled using a risk‑based containment and verification approach. For confirmed or suspected credential exposure or anomalous sign‑ins, impacted accounts were contained and access was restored by forcing password resets, clearing or blocking active sign‑in sessions, and unlocking accounts as needed; users re‑authenticated to OKTA/Teams after credentials were changed. Support reviewed OKTA and Azure AD sign‑in events and verified MFA/OKTA‑Verify activity; many log reviews showed no suspicious sign‑ins and cases with anomalies were escalated to specialists. For minimal‑exposure events where a user only opened an external phishing page briefly and did not enter credentials or observe errors, the message was removed and the webpage closed; after log review showed no suspicious activity no further technical containment was performed. Where links were tied to third‑party/vendor breaches, support collected sender and subject details, added IOC entries to the incident record for detection and hunting, and performed or recommended endpoint/PC malware scans and account checks to investigate possible data exposure (for example employee address‑book or customer data). Tickets were sometimes reopened or escalated when initial attribution was uncertain or when IOCs/endpoint findings required further investigation.

24. Account recovery when password-reset email may be phishing — alternate-email reset delivery
90% confidence
Problem Pattern

A user received or could not open a password-reset email (Okta) and suspected it might be phishing; the user requested that password recovery information be sent to a private/alternate email address.

Solution

Support generated a new Okta password-reset link and delivered it to the user's specified private email address (GMX) to complete account recovery via an alternate, user-controlled channel; the ticket was then closed.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X