{"id":112,"date":"2020-10-19T16:25:32","date_gmt":"2020-10-19T23:25:32","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/infosec\/?p=112"},"modified":"2023-02-09T12:04:46","modified_gmt":"2023-02-09T20:04:46","slug":"simulated-phishing-breakdown-2","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/simulated-phishing\/112","title":{"rendered":"NCSAM 2020: Simulated Phishing Breakdown #2 &#8211; Students"},"content":{"rendered":"<blockquote><p>If you were redirected here after entering your credentials, please read on to learn why the email you received was phishing. <strong>Don&#8217;t worry!<\/strong> This was a <strong><em>simulated<\/em><\/strong> phishing attempt so your credentials are safe. However, if the situation were real, the information you entered would now be in the hands of a cybercriminal.<\/p><\/blockquote>\n<p><em>The email you received was sent by Technology Services to simulate a real phishing email as part of National Cyber Security Awareness Month. <\/em><em> Visit <a href=\"https:\/\/www.pugetsound.edu\/about\/offices-services\/technology-services\/online-security-protect-your-personal-information\/2020-national-cyber-security-awareness-month\/\" target=\"_blank\" rel=\"noopener\">pugetsound.edu\/NCSAM2020<\/a> for more information. <\/em><em>The goal of simulated phishing is to provide an interactive way for campus members to learn how to quickly recognize and handle phishing emails.<\/em><\/p>\n<h2>How could I have detected the email was phishing?<\/h2>\n<ul>\n<li>At Puget Sound, &#8220;IT Helpdesk&#8221; is not the normal name for our technology support.<\/li>\n<li>The sender&#8217;s email address was from @pugetsound<strong><em>.com<\/em><\/strong> (instead of @pugetsound.edu). Always double-check the sender&#8217;s email address and don&#8217;t solely rely on the display name.<\/li>\n<li>The email had a generic greeting (e.g. Dear User or Dear Customer).<\/li>\n<li>The content of the email contained numerous grammatical errors.<\/li>\n<li>The link in the email, pugetsoundhelpdesk.com, is not a university website and is certainly not the website to log in to your Puget Sound email account. Always hover over links to see where they lead before clicking.<\/li>\n<li>The email tries to induce fear that your email service will be removed after 24 hours. Don&#8217;t be misled by the sense of urgency!<\/li>\n<li>If you are ever unsure about an email&#8217;s legitimacy, you can always contact the Service Desk at 253-879-8585.<\/li>\n<\/ul>\n<h2>What if I wasn&#8217;t sure if my mailbox was full?<\/h2>\n<p>You can check how much space you are currently using in your Puget Sound email by logging in to <strong>webmail.pugetsound.edu<\/strong>. Once you sign in, click the gear icon at the top right then click &#8220;Options.&#8221; You will see mailbox usage information displayed there.<\/p>\n<h2>Original Simulated Phishing Message<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-116\" src=\"http:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-15-20-email-suspension-1.png\" alt=\"\" width=\"1276\" height=\"670\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-15-20-email-suspension-1.png 1276w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-15-20-email-suspension-1-300x158.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-15-20-email-suspension-1-768x403.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-15-20-email-suspension-1-1024x538.png 1024w\" sizes=\"auto, (max-width: 1276px) 100vw, 1276px\" \/><\/p>\n<h2>Where did the link lead?<\/h2>\n<p>The link led to a fake sign-in page. Even though there is a university-related logo, it is very low resolution and a logo typically used by Athletics. Technology Services will not ask you to click a link in an email to increase your mailbox size.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-118\" src=\"http:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/fake-webmail-login.png\" alt=\"\" width=\"747\" height=\"892\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/fake-webmail-login.png 747w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/fake-webmail-login-251x300.png 251w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/p>\n<h2>Text of Simulated Phishing Message<\/h2>\n<p>Dear user,<\/p>\n<p>Your mailbox is reached 95% capacity. When your mailbox size are at 95%, you will unable to send or receive emails. However, you have 24 hour appeal period to cancel interference to email service.<\/p>\n<p>To request kindly an extension of the deadline and give a short term increase to your mailbox size, please login use the link below to avoid disruption.<\/p>\n<p>CLICK HERE<\/p>\n<p>If you do not take any move within 24 hours, your account will be suspended. Thank you for urgent attention to this event.<\/p>\n<p>IT Department<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you were redirected here after entering your credentials, please read on to learn why the email you received was phishing. Don&#8217;t worry! This was a simulated phishing attempt so your credentials are safe. However, if the situation were real, the information you entered would now be in the hands of a cybercriminal. The email [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3],"class_list":["post-112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-simulated-phishing","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=112"}],"version-history":[{"count":4,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/112\/revisions"}],"predecessor-version":[{"id":985,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/112\/revisions\/985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/120"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}