A phishing email is targeting the McGill community with the subject "RE: Final Reminder: Complete: [name] DocsOnline Docs Via E-Sign #63 - Mcgill Project-08(REVISED)." See an example of the message above.


In McGill’s ongoing efforts to strengthen our security, we will continue to introduce enhancements to Microsoft Authenticator, including:
Are you the owner of an MS Teams workspace featuring a wiki tab, typically used for meeting notes?
If so, we would like to inform you about a significant change concerning the wiki feature (usually used for meeting notes) in Microsoft Teams. Microsoft has announced that as of January 2024, the wiki feature will be retired and replaced by OneNote.
In this article:
In an effort to limit the impacts of unsolicited and fraudulent emails being sent in large numbers to the McGill community, McGill’s IT Infrastructure & Information Security has decided to limit the number of emails that can be sent from non-2FA (two-factor authentication) enabled email accounts.

The way we currently access McGill’s VPN (via Cisco AnyConnect) has been replaced by Cisco Secure Client. Cisco Secure Client is an upgraded version of Cisco AnyConnect and offers enhanced features, security and performance.

The login page for Minerva has been updated to implement Two-Factor Authentication (2FA) and Single Sign-On (SSO).
The new login page includes two options to log in. Please take note of which login method you should use:

A phishing email is targeting the McGill community with the subject "(Attention chair.psychiatry) | Re-authenticate 2 Factor Authentication (2Fa) | September 2023". See an example of the message above. The message contains a QR code and asks you to scan it with your phone camera:
"Dear User:
Your authenticator session has expired today. Kindly re-authentication with your mobile device to avoid being locked out of your email account.
Quickly scan the QR Code below with your smartphone camera to re-authenticated your password security.

A phishing email is targeting the McGill community with the subject "Mcgill Authentication For [name]@mcgill.ca Expires on [date]". See an example of the message above. The message contains a QR code and asks you to scan it with your phone camera:
"Message date: [date]
Promptly scan below QR code with your phone camera to release HELD messages
[fraudulent QR code]
Some messages failed to load and could'nt be delivered."
There is a phishing email targeting the McGill community with the subject "Completed: Complete with Via-Sign: #7 - 34499-07-# Monday July 2023". The message body contains a fraudulent link.

A targeted phishing email is currently circulating, asking you to click on a fraudulent link (see image).
Please DO NOT click any links or reply to the message. Delete this email immediately! It does NOT come from a McGill source.

A targeted phishing email is currently circulating, asking you to open an attachment that contains a fraudulent link. See an example of the message to the left.
Please DO NOT click any links or reply to the message. Delete this email immediately! It does NOT come from a McGill source.

There is a phishing email targeting the McGill community with the subject "Microsoft De-Activation In Progress". See an example of the message above. The example we received says,
"Dear User,
This is the last time we will notify you that we'll stop processing incoming emails in your school account, and the reason is you failed to verify your Microsoft account which may lead to the permanent deletion of your account from our database in the next few hours.
Kindly take a minute to complete our email verification below
The education network is currently facing a large wave of fraudulent emails with a Microsoft OneNote attachment containing Qakbot malware. The impact of an infection by this malware is high, so the IT Information Security department has taken the precaution to block emails containing these attachments when they originate from an external source (e.g. come from a non-McGill email address).
We recognize that there will be cases where people may need to receive legitimate OneNote files from external sources who do not have a McGill email address. As a workaround, we recommend you:

A targeted phishing email is currently circulating, asking you to open an attachment that contains a fraudulent link to a shared document. See an example of the message to the left.
Please DO NOT click any links or reply to the message. Delete this email immediately! It does NOT come from a McGill source.

McGill-managed desktop and laptop Windows computers will receive an important security update beginning on October 31, 2022. Cisco Secure Endpoint, McGill’s antivirus software, will receive its regularly scheduled, monthly update. The process to update all affected machines will take approximately 2 weeks.