{"id":1180,"date":"2024-01-23T09:18:37","date_gmt":"2024-01-23T17:18:37","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1180"},"modified":"2024-01-23T09:18:39","modified_gmt":"2024-01-23T17:18:39","slug":"phishing-from-1-23-2024-2024-employment-evaluation","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1180","title":{"rendered":"Phishing from 1\/23\/2024: &#8220;2024 EMPLOYMENT EVALUATION&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>harperliam2022[@]gmail[.]com<br><strong>Subject:<\/strong> 2024 EMPLOYMENT EVALUATION<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"594\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-1024x594.jpg\" alt=\"\" class=\"wp-image-1181\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-1024x594.jpg 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-300x174.jpg 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-768x446.jpg 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish.jpg 1218w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Where Did the Link Lead?<\/p>\n\n\n\n<p>The link led to a Google Form asking for your password. Even though Google Forms is a legitimate service, attackers can use it to collect sensitive personal information from you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"642\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link-1024x642.jpg\" alt=\"\" class=\"wp-image-1182\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link-1024x642.jpg 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link-300x188.jpg 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link-768x482.jpg 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link-1440x903.jpg 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/01\/1-23-24-evaluation-phish-link.jpg 1457w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Many phishing attempts utilize legitimate productivity tools such as Google Workspace or OneDrive. <\/li><li>The email is impersonating a campus member but notice the sender&#8217;s email address is not @pugetsound.edu.<\/li><li>Never enter your password or submit sensitive personal information on online forms such as Google Forms.<\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>harperliam2022[@]gmail[.]com<br><strong>Subject:<\/strong> 2024 EMPLOYMENT EVALUATION <\/p>\n\n\n\n<p>Amy Hackett invited you to fill in a form:<\/p>\n\n\n\n<p>2024 EMPLOYMENT EVALUATION<\/p>\n\n\n\n<p>Designed for Microsoft and Office 365 users only.<\/p>\n\n\n\n<p>FILL OUT FORM<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: harperliam2022[@]gmail[.]comSubject: 2024 EMPLOYMENT EVALUATION Where Did the Link Lead? The link led to a Google Form asking for your password. Even though Google Forms is a legitimate service, attackers can use it to collect sensitive personal information from you. Tips for Detection Many phishing attempts utilize legitimate productivity tools such as [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1180"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1180\/revisions"}],"predecessor-version":[{"id":1183,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1180\/revisions\/1183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1181"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}