| 
			
			 The website provided appears very similar to 
			the legitimate site in an effort to steal the employee’s 
			credentials. Once the employee enters his/her login information, the 
			scammer takes that information and signs into the employee’s 
			official human resources account to change the employee’s direct 
			deposit information. This redirects the employee’s paycheck to the 
			bank account of another individual involved in the scam. Consequences of this scam: 
				
				The employee’s paycheck can be stolen.
				The money may not be returned in full to 
				the employee.
				The scammers can take the employee’s log-in 
				credentials and attempt to log into other accounts that belong 
				to the employee. 
			
			 Tips on how to protect yourself from this scam: 
				
				Look for poor use of the English language 
				in e-mails such as incorrect grammar, capitalization, and 
				tenses. Many of the scammers who send these messages are not 
				native English speakers.
				Roll your cursor over the links received 
				via e-mail and look for inconsistencies. If it is not the 
				website the e-mail claims to be directing you to, then the link 
				is to a fraudulent site.
				Never provide credentials of any sort via 
				e-mail. This includes after clicking on links sent via e-mail. 
				Always go to an official website rather than from a link sent to 
				you via e-mail. 
			
			[to top of second column] | 
 
				 If you have been a victim of this scam, you may 
			file a complaint with the FBI’s Internet Crime Complaint Center at 
			www.IC3.gov. Please reference Public Service Announcement (PSA) 
			number I-011315b-PSA in your complaint.  The IC3 produced a PSA in May 2014 titled 
			“Cyber-related Scams Targeting Universities, Employees, and 
			Students,” which mentioned this scam. The PSA can be viewed at
			
			http://www.ic3.gov/media/2014/140505.aspx.  
			[Taken from the FBI website] 
			  
			 |