{"id":1283,"date":"2024-09-30T14:42:35","date_gmt":"2024-09-30T21:42:35","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1283"},"modified":"2024-09-30T14:42:37","modified_gmt":"2024-09-30T21:42:37","slug":"phishing-from-9-30-2024-new-voicemail-1-minute-30-seconds-a-wireless-team-caller","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1283","title":{"rendered":"Phishing from 9\/30\/2024: &#8220;New Voicemail (1 minute, 30 seconds) a wireless team caller&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>[<em>NAME_REMOVED<\/em>]@afandpa[.]org<br><strong>Subject:<\/strong> New Voicemail (1 minute, 30 seconds) a wireless team caller [<em>NAME REMOVED<\/em>]<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"583\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish.png\" alt=\"\" class=\"wp-image-1284\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish.png 595w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-300x294.png 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Where did the link lead?<\/p>\n\n\n\n<p>The link first led to a page on randyrichardsonlaw[.]com asking you to click to play the voicemail.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"700\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-1-1024x700.png\" alt=\"\" class=\"wp-image-1285\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-1-1024x700.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-1-300x205.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-1-768x525.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-1.png 1258w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The link then went to a page that appeared to have an audio file to play on gvlrco[.]com. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"522\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-1024x522.png\" alt=\"\" class=\"wp-image-1286\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-1024x522.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-300x153.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-768x391.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-1536x783.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2-1440x734.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-2.png 1862w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>When clicking on the page, it led to a fake Microsoft login page designed to steal your credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"523\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-1024x523.png\" alt=\"\" class=\"wp-image-1287\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-1024x523.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-300x153.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-768x393.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-1536x785.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4-1440x736.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/09\/9-30-24-voicemail-phish-link-4.png 1698w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Legitimate voicemail alerts to your university phone number will come from Zoom, no-reply[@]zoom[.]us<\/li><li>Always hover over links to see where they lead. If it goes to an unfamiliar website, use caution. <\/li><li>Never enter your credentials on websites you do not recognize or online forms.<\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>[<em>NAME_REMOVED<\/em>]@afandpa[.]org<br><strong>Subject:<\/strong> New Voicemail (1 minute, 30 seconds) a wireless team caller [<em>NAME REMOVED<\/em>] <\/p>\n\n\n\n<p>This message was generated automatically.<\/p>\n\n\n\n<p>You have received an incoming voice message today. Please take a moment to preview it and respond.<br>Hello, This is [<em>NAME REMOVED<\/em>] from AMERICAN FOREST &amp; PAPER ASSOCIATION, I hope you are doing well today? I called regarding\u2026. Transcribe the entire message.<\/p>\n\n\n\n<p>You can listen to the recording Here: Play voice here<\/p>\n\n\n\n<p>ID &#8211; [<em>NAME_REMOVED<\/em>]@afandpa[.]org<br>Call from: +1 (703) 647-5113<br>Date of call: 2024-09-30<br>Called by: [<em>NAME REMOVED<\/em>] <br>Length of phone call: 1 minute, 30 seconds<\/p>\n\n\n\n<p>Thank you for using the new Cisco Unity Connection Messaging System (MICROSOFT TEAM) .<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: [NAME_REMOVED]@afandpa[.]orgSubject: New Voicemail (1 minute, 30 seconds) a wireless team caller [NAME REMOVED] Where did the link lead? The link first led to a page on randyrichardsonlaw[.]com asking you to click to play the voicemail. The link then went to a page that appeared to have an audio file to play [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1283"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1283\/revisions"}],"predecessor-version":[{"id":1288,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1283\/revisions\/1288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1284"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}