{"id":1124,"date":"2023-06-27T15:00:55","date_gmt":"2023-06-27T22:00:55","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1124"},"modified":"2023-06-27T15:06:39","modified_gmt":"2023-06-27T22:06:39","slug":"phishing-from-6-27-23-06272023-66","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1124","title":{"rendered":"Phishing from 6\/27\/23: &#8220;#06272023 &#8211; 66&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: ewilson[@]comfortkeepers[.]com<br><strong>Subject<\/strong>: #06272023 &#8211; 66<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"658\" height=\"532\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing.jpg\" alt=\"\" class=\"wp-image-1125\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing.jpg 658w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-300x243.jpg 300w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you are not expecting an email or attachment from an individual, use extra caution. <\/li><li>Notice the discrepancy between the file extension .xlsx while claiming to be a fax. An emailed fax would likely be an image file or a PDF, not an Excel document. <\/li><li>Always hover over links to see where they lead.<\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Where Did the Link Lead?<\/p>\n\n\n\n<p>The link goes to a popular design website, canva[.]com with a hyperlinked image created by the malicious actor. Attackers frequently use known services such as Google Drive, One Drive, Canva, etc as the initial hyperlink in an email to lend credibility to the phishing message.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-1024x633.jpg\" alt=\"\" class=\"wp-image-1128\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-1024x633.jpg 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-300x185.jpg 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-768x474.jpg 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-1536x949.jpg 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1-1440x889.jpg 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-1.jpg 1627w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The link then goes to a suspicious website, https:\/\/lblawyer-1318439371[.]cos[.]ap-bangkok[.]myqcloud[.]com\/lblawyer[.]html, hosting a fake Microsoft login page. Never enter your credentials on sites you do not recognize and double-check the URL to confirm it is a trusted site before logging in. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-2-1-1024x536.jpg\" alt=\"\" class=\"wp-image-1127\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-2-1-1024x536.jpg 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-2-1-300x157.jpg 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-2-1-768x402.jpg 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2023\/06\/6-27-23-canva-fax-phishing-link-2-1.jpg 1292w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: ewilson[@]comfortkeepers[.]com<br><strong>Subject<\/strong>: #06272023 &#8211; 66 <\/p>\n\n\n\n<p>You have received an inbound secure fax from Comfort Keepers.<\/p>\n\n\n\n<p>Print or View<\/p>\n\n\n\n<p>Reference: Microsoft06272023.xlsx<\/p>\n\n\n\n<p>Received &amp; processed: Tuesday, 27 June 2023<\/p>\n\n\n\n<p>Pages: 2<\/p>\n\n\n\n<p>Resolution: 300dpi x 300dpi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: ewilson[@]comfortkeepers[.]comSubject: #06272023 &#8211; 66 Tips for Detection If you are not expecting an email or attachment from an individual, use extra caution. Notice the discrepancy between the file extension .xlsx while claiming to be a fax. An emailed fax would likely be an image file or a PDF, not an Excel [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1124"}],"version-history":[{"count":2,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1124\/revisions"}],"predecessor-version":[{"id":1130,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1124\/revisions\/1130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1125"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}