This page is for the “Targeted Attack Email Training”.
There is no risk of virus infection or account leakage by participating in this training.
This page is displayed to those who have attempted to log in using the training login form.
- The following suspicious points have been identified in this training email, and these characteristics have been confirmed to have actually been used in targeted attack emails.
1) The domain name of the sender's email address or the URL in the body of the email is different from the legitimate one, or the email is from an organization/department that does not exist.
2) The signature, contact information, etc. are not included, or the information is incorrect.
- Appropriate response when receiving suspicious emails
- Do not open attachments or access URLs in the body of emails from suspicious senders or with suspicious content.
- If you notice anything suspicious, make sure not to access it, and then delete the email appropriately.
- Please read “What You Should Know to Prevent Phishing Emails and Targeted Attacks” (issued on March 28, 2024).
- Appropriate response in the event of a virus infection or information leak (or possibility of such)
- Please disconnect the device from the network immediately, then contact the “departmental contact
(e.g. general affairs)” and follow their instructions.
- We will send you a questionnaire about this email training later. Please cooperate with the survey so that we can use it as a reference in the future.
[In charge] Security Management Team, Information Environment Group, Information Systems Department,
The University of Tokyo