12 of 13 (Total: 247)
We will inform you about the opening date of the PC classroom during the winter holiday this year.Please see the calendar displayed on the top page of the web.sic.shibaura-it.ac.jp site.   Opening and closing during winter holidays Target periodDecember 26, 2019-January 6, 2020 (Closed on weekends and holidays) Self-service opening hours09:00 - 17:00 Classes subject to opening of self-service rooms[Toyosu Campus] PC training room 6, I / O room[Omiya Campus] Building 5 Information Processing Classroom, Building 5 Input / Output Room[Shibaura Campus] PC training room 3-4, input / output corner* Opening conditions vary depending on the day. When using, please check the “Open Calendar”.* Opening schedule may change due to maintenance. The latest information will be listed on this page.It will not be used after hours or on holidays. (The I / O room will be unlocked 24 hours with a student ID card) Outside the winter holidays (~ 12/25, 1/7 ~), we will use self-service after hours and holi...
From around 2020/01/09 15:32 to 15:55, there were reports that phishing emails spoofing the University's WebActive! Mail were being distributed to multiple email addresses of the University. When you access the link in the body of the e-mail, a site similar to the university's Web mail system will be displayed. If you enter your username and password on this site, your credentials will be exploited and unauthorized access may be possible. If you receive this email, please delete it without accessing the link. If you accidentally enter your user name and password, change the password and contact the Information System Section. Subject Please confirm your account Example text Your mailbox is almost full. 9407MB 3GBClick here to upgrade for free and 5GB will be added automaticallyDelete all unnecessary items from the mailbox and reduce the mailbox sizeby emptying the Deleted Items folder.click HERE https://activemail.gdhjtzi~(省略)~ Thanks, Active!. Webmail Team=-=-=-=-=-=-=-Disclai...
Around 2020/01/10 19: 40-19: 53, there were reports that phishing emails spoofing the University's WebActive! Mail were being distributed to multiple email addresses of the University. When you access the link in the body of the e-mail, a site similar to the university's Web mail system will be displayed. If you enter your username and password on this site, your credentials will be exploited and unauthorized access may be possible. If you receive this email, please delete it without accessing the link. If you accidentally enter your user name and password, change the password and contact the Information System Section. Subject IT Notification Service Center Text YOUR MAlLB0X IS OUT OF DATEYour MAILB0X is out of date, and will stop sending and Receiving messages,Starting from January 9th 2020, kindly Update your now to prevent this from happening.https://activemail.gdhjtzi~(省略)~ OFFICE 365 - OUTLOOK(C) 2020 Microsoft LLC. Phishing site image
At around 14:41 and 17:18 2020/01/06 and around 17:18 and around 06:50 to 07:45 2020/01/07, phishing emails spoofing the University's WebActive! Mail are distributed to multiple email addresses of the University There was a report that he had been. When you access the link in the body of the e-mail, a site similar to the university's Web mail system will be displayed. If you enter your username and password on this site, your credentials will be exploited and unauthorized access may be possible. If you receive this email, please delete it without accessing the link. If you accidentally enter your user name or password, change the password and contact the Information System Section. Subject Active! mail Team 2020 Example text Your mailbox is almost full. 9407MB 3GBClick here to upgrade for free and 5GB will be added automaticallyDelete all unnecessary items from the mailbox and reduce the mailbox sizeby emptying the Deleted Items folder.click HEREhttps://activemail.gdhjtzi~(Omitted...
There are only a few places left in 2019. Suspicious emails (including SMS) have increased since the second half of 2019. According to information from the Tokyo Metropolitan Police Department, illegal remittance damage related to Internet banking, which seems to be phishing, has increased rapidly since September 2019. Sudden increase in fraudulent remittance damage related to internet banking, which seems to be caused by phishing (attention in cooperation with JBA)https://www.npa.go.jp/cyber/policy/caution1910.html The period of the year-end and New Year holidays is also a period when security response is weak, and attacks targeting that period usually tend to increase. We have compiled a list of matters that you should be aware of regarding security, so students, faculty and staff should read the following materials and be careful not to be damaged. セキュリティ警戒情報 - 不審メール編 (PDF 3,164KB)(Accessible only from campus) In case of damage, please contact the Information Syst...
From December 18th, 2019, around 09:23 to 9:32, there was a report that phishing emails pretending to be WebActive! Mail were distributed to multiple email addresses of the University. When you access the link in the email text, you will see a site that looks just like the University's Web mail system. If you enter your username and password on this site, your authentication information will be exploited and unauthorized access may occur. If you receive this email, please delete it without accessing the link. If you have accidentally entered your user name or password, please change your password and contact the Information Systems Division.   Subject 受信メールが失敗しました Text example 12/18/2019 At 8:23:00 AM, delivery of three incoming emails to ~ mail address ~ inbox failed. Restore email Shibaura Institute of Technology Media Center,c2019 Information Media Center, Shibaura Institute of Technology Phishing site screen
2019/12/04 From around 8:47 to 10:45, there was a report that emails with suspicious Excel attachments were being scattered. The subject is as follows. This attachment is malware. Discard it without opening it. Subject Correction 12/04 Business Report Attached file name Business Report Input for 2019.xls Text example Click to enlarge
2019/12/03 From around 18:12 and around 20:56, it was reported that phishing emails for Webmail administrators were scattered. The subject is as follows. The URL listed in this email is a phishing site. Never access the link destination. Also, do not enter your email address, username or password carelessly. Subject Security Alert: Important notice about your webmail account Text example Click to enlarge
From 19/11/2019 8:06, it was reported that emails with shortened URLs for downloading suspicious xls files were being distributed. There are three types of subject lines: This URL is a site for downloading malware. Please discard the URL (Open button) in the email without accessing it. subject Receptionさんが"KJ181119.xls"をあなたAccounting is inviting you to collaborate on payroll_nov_19.xlsaccountant is inviting you to collaborate on payroll_nov_19.xls Text example   Click to enlarge  
From November 20, 2019, around 7:30, it was reported that emails with shortened URLs for downloading suspicious xls files were being distributed. There are three types of subject lines: This URL is a site for downloading malware. Discard without accessing the View and View File buttons in the email. Subject example HRM sent you a file "shortlisted_11.2019.xls" on BoxHRD sent you a file "shortlisted_11.2019.xls" on BoxHR sent you a file "shortlisted_11.2019.xls" on Boxhrd sent you a file "shortlisted_11.2019.xls" on Boxhr sent you a file "shortlisted_11.2019.xls" on Box Text example   Click to enlarge
Around November 29, 2019 at 10:07, there was a report that phishing emails pretending to be WebActive! When you access the link in the email text, you will see a site that looks just like the University's Web mail system. If you enter your username and password on this site, your authentication information will be exploited and unauthorized access may occur. If you receive this email, please delete it without accessing the link. If you have accidentally entered your user name or password, please change your password and contact the Information System Section as soon as possible. Subject 返されたメールを復元する Text example Click to enlarge
2019/12/03 From around 7:38, there was a report that emails with attachments of suspicious Excel were being scattered. The subject is as follows. This attachment is malware. Discard it without opening it. subject 令和元年度職員録 添付ファイル名 SKM_C30819111574023.xls (The number part is random) Text example
2019/12/03
Security(セキュリティ)
  In Lumin PDF app that can edit PDF files on Google Drive, 15.5 million user information leaked in April 2019. The leaked data includes API access token (* 1), email address, name, password, etc. to Google Drive. We have received information that the University account is included in the leaked data. You can check whether your user information is included in the leaked data on the Have I Been Pwnded site. (* 1) If you authenticate with API access token, you can access the file without password or 2-step verification.   What to do if your email address is included in the leaked data The API access token is forcibly disabled on Google on September 18, 2019, but it will be in a state where unauthorized access to files on Google Drive will be possible between 2019/4 and 2019/9/18 I guess it was. If an event such as information leakage is confirmed, please contact the Information Networks Systems Section. If you are using only in conjunction with (G suite for Education) used at the Univ...
2019/11/18 6:32頃より、自分自身のメールアドレスから迷惑メールが受信されていると報告がありました。 件名は下記の様に様々あります。 これは脅迫詐欺メールです。このようなメールが届いた場合は破棄してください。 件名 緊急対応! 類似メールの件名 AVアラートすぐにお読みくださいあなたの心の安らぎの問題。 本文の例 こんにちは! 私のニックネームは~です。私は半年以上前にこのメールボックスをハッキングしました (あなたはこの手紙をあなたから受け取った),私が作成したウイルス(トロイの木馬)をあなたのオペレーティングシステムに感染させ、あなたを長い間監視してきました。 その後もパスワードを変更したとしても、それは問題ではありません。私のウイルスはあなたのコンピュータ上のすべてのキャッシングデータを傍受しました私のために自動的にアクセスを保存しました。 私はすべてのあなたのアカウント、ソーシャルネットワーク、電子メール、ブラウジング履歴にアクセスできます。したがって、私はすべてのあなたの連絡先、あなたのコンピュータからのファイル、写真、ビデオのデータを持っています。 私はあなたが時折訪れる親密なコンテンツサ...
2019/10/31 around 11:22 There were reports that phishing emails pretending to be University WebActive! Mail were distributed to multiple university email addresses. When you access the link in the email text, you will see a site that looks just like the University's Web mail system. If you enter your username and password on this site, your authentication information will be exploited and unauthorized access may occur. If you receive this email, please delete it without accessing the link. If you have accidentally entered your user name or password, please change your password and contact the Information Systems Division. subject Dear: Active!Mail pending account Owner Text example Dear: Active!Mail Webmail account Owner,This message is from Active! Webmail messaging center to all Active! email account owners. We are currently upgrading our data base and e-mail account center .We are deleting all Active! Webmail email account to create more space for new accounts.To prevent your acc...
2019/10/28
Security(セキュリティ)
Since the end of August 2019, Emotet Malware has been in fashion in Japan. Emotet is malware that is often infected by opening Word files attached to e-mails. If you get infected with Emotet, you will not only steal Outlook email information (email server authentication information, inbox email address, subject, etc.) but also to other malware (TrickBot, Ryuk ransomware, Ursnif banking malware, etc.) Additional infection may occur. The stolen email information may be used to disseminate emails for spreading infection.   Emotet and TrickBot information (Sophos)   Please note that the subject line of emails varies and some of them take the form of replies to stolen emails. If you receive such an email, please do not open it and contact the Information Systems Division. If you open it and activate the content, disconnect from the network immediately. Please make sure that the anti-virus software on your device is operating correctly. Attached file example 件名の例 Cambiar los terminos ...
2019/10/22At around 08:30, there was a report that phishing emails pretending to be University WebActive! Mail were distributed to multiple university email addresses. When you access the link in the email text, you will see a site that looks just like the University's Web mail system. If you enter your username and password on this site, your authentication information will be exploited and unauthorized access may occur. If you receive this email, please delete it without accessing the link. If you have accidentally entered your user name or password, please change your password and contact the Information System Division. Title Dear customer Active! Reply to Mail Text example Dear customers,The account has been temporarily disabled.Don't worry, just check some informationPlease login from the link belowhttps: // ~ URL of phishing site ~Customer Service Support Active! Mail Phishing site screen
2019/10/28 From around 5:45, there was a report that spam was being received from my own email address. There are various subject lines as follows. This is a threatening scam email. If you receive such an email, please discard it. Title Emergency response! Similar emailAV alertPlease read immediatelyThe problem of peace of mind Text example Hello, Dear user of shibaura-it.ac.jp.I have installed one RAT software on your device.At this moment, your email account is hacked (Now I have access to your account).Downloaded all sensitive information from your system. I got some evidence.The most interesting moment I discovered is a video record of your masturbation. I posted my virus on a porn site and installed it on your operating system.When I clicked the play button on the porn video, at that moment my Trojan was downloaded to your device.After installation, the front camera will take a video every time you masturbate. In addition, the software will synchronize with the selected video....