{"id":1324,"date":"2024-12-19T14:43:21","date_gmt":"2024-12-19T22:43:21","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1324"},"modified":"2024-12-19T14:43:23","modified_gmt":"2024-12-19T22:43:23","slug":"phishing-from-12-19-2024-staff-report","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1324","title":{"rendered":"Phishing from 12\/19\/2024: &#8220;Staff Report&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: gcooper[@]teaneckschools[.]org<br><strong>Subject<\/strong>: Staff Report<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-1024x459.png\" alt=\"\" class=\"wp-image-1325\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-1024x459.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-300x135.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-768x344.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing.png 1202w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice that the email is not from an @pugetsound.edu email address. Legitimate emails from Human Resources will come from an @pugetsound.edu email address. <\/li><li>Notice the false sense of urgency in the text of the message, such as &#8220;immediate review.&#8221;<\/li><li>Notice the odd and generic salutation of &#8220;Dear Staffs.&#8221;<\/li><li>Always investigate links before clicking on them. Once you are on a website, double-check the URL to ensure it is a trusted site especially if it is asking you to enter your password. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Where did the link lead?<\/p>\n\n\n\n<p>The link led to a form on Jotform designed to look like a fake login page to steal your password. Never enter sensitive information on web-based forms even if it is hosted on a legitimate service like Google Forms or Jotform.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-link-1024x633.png\" alt=\"\" class=\"wp-image-1326\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-link-1024x633.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-link-300x185.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-link-768x475.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2024\/12\/12-19-24-staff-report-phishing-link.png 1432w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: gcooper[@]teaneckschools[.]org<br><strong>Subject<\/strong>: Staff Report <\/p>\n\n\n\n<p>Dear Staffs,<\/p>\n\n\n\n<p>We&#8217;re sharing the updated 2024\/25 staff assessment report. Your assessment is included in this report. Immediate review is important. We value your contribution.<\/p>\n\n\n\n<p>Best Regards,<\/p>\n\n\n\n<p>HR Department.<\/p>\n\n\n\n<p>CLICK here to view this report.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: gcooper[@]teaneckschools[.]orgSubject: Staff Report Tips for Detection Notice that the email is not from an @pugetsound.edu email address. Legitimate emails from Human Resources will come from an @pugetsound.edu email address. Notice the false sense of urgency in the text of the message, such as &#8220;immediate review.&#8221; Notice the odd and generic salutation [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1324"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1324\/revisions"}],"predecessor-version":[{"id":1327,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1324\/revisions\/1327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1325"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}