The subject line of the email indicates “Action Required - Fine for Traffic Violations.” The body of the email further states that “a vehicle registered to you was captured running a red light” along with a violation date, ticket number, and a specified fine amount. There were also various links to click on to view photos, pay the fine, or for more information regarding the email security service. These links redirect the user to other websites not affiliated with PennDOT.
Below is an example of the actual email received as part of this particular scam.
There are signs that indicate this is a phishing scam, including: poor spelling or grammar within the message. This message not only has “violation” spelled incorrectly, but also lists two different violation dates. Additionally, citations or traffic tickets issued in Pennsylvania are not paid directly to PennDOT. Fraudulent emails purporting to be from legitimate government agencies is not new, but such scams often change form.
Phishing is the process of deceiving recipients into sharing sensitive information with an unknown third-party, or cyber attacker, typically through email; however, websites and internet pop-up ads are also used. When using email, it is difficult to know exactly with whom you are communicating.
Scammers utilize this uncertainty to pose as legitimate businesses, organizations, or individuals to gain the trust of users and compromise their personal, financial, and/or other sensitive information. Scammers appear to represent legitimate businesses or organizations by spoofing email addresses, creating fake websites with legitimate logos, and providing phone numbers to illegitimate customer service centers or tech support centers operated by attackers.
• Follow Best Practices. Please make sure users follow best security practices regarding email security. Do not reply to these types of emails and delete the message if and when received. If you receive an email asking for privileged information, you should delete it immediately.
• Never give out privileged information. Oftentimes "Phishing" emails will use legitimate 'From:' email addresses, well-known logos, or links to reputable businesses in the message. Some may ask for personal information such as your name, address, date of birth, Social Security number (SSN) passwords etc. You should never reply to inquiries asking for privileged information. If you do receive these types of requests through email or via verbal request, please do not reply to the request.
• Don’t open anything from an unknown source. If the sender’s name is not recognized, it should not be opened. If the name is recognized, but the contents appear questionable, contact that person to verify they sent the email. Always remember not to click on links or attachments contained in e-mails from un-trusted or unknown sources.
• Remember that it always pays to be careful. If it looks suspicious or if there is a doubt about its legitimacy in any way, delete the message and do not reply or ask your IT department for assistance.
Always remember the following cyber security tips when dealing with content and links in suspicious e-mails:
• NEVER open a link or attachment when the sender is not known.
• NEVER click on an e-mail link that only has an IP address.
• NEVER run a program or allow a plug-in when the source is unknown or un-trusted