{"id":1270,"date":"2024-09-11T08:48:43","date_gmt":"2024-09-11T15:48:43","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1270"},"modified":"2024-09-12T11:28:09","modified_gmt":"2024-09-12T18:28:09","slug":"phishing-from-9-10-2024-september-11-upcomlng-reports-agenda-for-faculty-and-staffs-dlrectory-2024","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1270","title":{"rendered":"Phishing from 9\/10\/2024: &#8220;SEPTEMBER 11 UPCOMlNG REPORTS &amp; AGENDA FOR FACULTY AND STAFFS DlRECTORY 2024&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: CMoreno[@]my[.]nnu[.]edu<br><strong>Subject<\/strong>: SEPTEMBER 11 UPCOMlNG REPORTS &amp; AGENDA FOR FACULTY AND STAFFS DlRECTORY 2024<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"406\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-10-24-directory-phish-1024x406.jpg\" alt=\"\" class=\"wp-image-1271\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-10-24-directory-phish-1024x406.jpg 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-10-24-directory-phish-300x119.jpg 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-10-24-directory-phish-768x305.jpg 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-10-24-directory-phish.jpg 1212w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice that the email sender does not come from an @pugetsound.edu address. <\/li><li>Many phishing emails impersonate HR or IT. Always use extra caution, particularly when there is a sense of urgency. <\/li><li>Notice that the subject line uses spellings like &#8220;UPCOMLNG&#8221; and &#8220;DLRECTORY&#8221; which are likely attempts to bypass email filtering rules. Deliberate typos should be a red flag. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: CMoreno[@]my[.]nnu[.]edu<br><strong>Subject<\/strong>: SEPTEMBER 11 UPCOMlNG REPORTS &amp; AGENDA FOR FACULTY AND STAFFS DlRECTORY 2024 <\/p>\n\n\n\n<p>Hello,<br>I hope this email finds you well. I am pleased to inform you that the HR Department has recently finalized the Assessment Report procedure for all staff members. It is imperative that you treat this matter with urgency.<\/p>\n\n\n\n<p>Attached below, you will find the relevant file that contains your individual Assessment Report. Please open it to access the information<\/p>\n\n\n\n<p>Click Here To View Report<\/p>\n\n\n\n<p>Thank you for your prompt attention to this matter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: CMoreno[@]my[.]nnu[.]eduSubject: SEPTEMBER 11 UPCOMlNG REPORTS &amp; AGENDA FOR FACULTY AND STAFFS DlRECTORY 2024 Tips for Detection Notice that the email sender does not come from an @pugetsound.edu address. Many phishing emails impersonate HR or IT. Always use extra caution, particularly when there is a sense of urgency. Notice that the subject [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1270"}],"version-history":[{"count":3,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1270\/revisions"}],"predecessor-version":[{"id":1274,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1270\/revisions\/1274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1271"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}