IN.gov - Skip Navigation

Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.

Amber Alert
Amber Alert - TEST
  • password_reset_widget
  • custom_app_dev_widget
  • PC_Refresh
  • service_rates_widget
  • itp_widget

Indiana Office of Technology

IOT > Security > Matters of Interest > Phishing Phishing

Dangerous Scams - Phishing Attacks

Phishing is one particularly misleading and dangerous type of Spam the state workforce will encounter. Phishing messages have the following characteristics:

  • They are unsolicited.
  • They contain an urgent requests for personal financial information. 
  • To entice a response, they frequently contain exciting or upsetting statements.
  • They will purport to be from a legitimate business (banks, PayPal, e-Bay, etc.)
  • They are generally not personalized, though they can be. 
  • You may be directed fill out a form in the email, go to a linked website, or call a telephone number. 
  • The sender will eventually seek some or all of the following:
    1. Name
    2. Address
    3. Date of birth
    4. Bank account
    5. Social security number
    6. Login ID and password

The goal is to fraudulently gain your information and use it for their personal gain. The number and sophistication of phishing scams sent out to consumers is continuing to increase dramatically. While online banking and e-commerce is very safe, as a general rule you should be careful about giving out your personal financial information over the Internet.

What Should I Do If I Receive a "Phishing" Message?

Report the message to postmaster using the instructions for reporting SPAM. Most legitimate businesses will not solicit such information through email. If you believe it is legitimate, call a customer service number (not one listed in the email) or type the legitimate company URL directly into the address line (do not cut and paste from the email).

The site below can be referenced to see if the message you have received is part of a phishing attack. Failing to find your particular message on any list does not make it legitimate!

Phishing Techniques Designed to Trick Recipients

  • Realistic looking and sounding messages
  • Effective use of legitimate company logos in the counterfeit message
  • Using part of a legitimate company name in a phony URL
  • Redirected links - phishing emails make it appear as if a legitimate address is being accessed when actually routing to a fake
  • Phone systems are now used as part of scams to gather confidential information instead of an electronic form
  • Faking the yellow security lock graphic.  Typically double-clicking on the lock displays the security certificate
  • Spoofing or forging https:// in the URL to give the appearance of a secure site