{"id":1353,"date":"2025-08-08T15:06:05","date_gmt":"2025-08-08T22:06:05","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1353"},"modified":"2025-08-08T15:06:05","modified_gmt":"2025-08-08T22:06:05","slug":"phishing-from-8-8-2025-research-assistants","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1353","title":{"rendered":"Phishing from 8\/8\/2025: &#8220;Research Assistants&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: joseph.messina[@]live[.]law[.]cuny[.]edu<br><strong>Subject:<\/strong> Research Assistants<br><strong>Subject<\/strong>: Paid Remote Research Roles for Students<br><strong>Subject<\/strong>: Remote Research Assistant Opportunity<br><strong>Subject<\/strong>: Remote Research Assistant<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"414\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-1024x414.png\" alt=\"\" class=\"wp-image-1354\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-1024x414.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-300x121.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-768x311.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-1536x621.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish-1440x582.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/08\/20250808_research_assistant_phish.png 1612w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The sender is attempting to impersonate a campus member. Notice that the email sender is not that individual<\/li>\n\n\n\n<li>Being asked to contact the sender via text message or an alternate personal email address with no reasonable explanation should be suspicious. This is common in phishing emails so that attackers can continue communicating with you with less protections in place.<\/li>\n\n\n\n<li>Beware of job scams and anything that seems too good to be true.<\/li>\n\n\n\n<li>Please see the FTC\u2019s page on fraudulent job offers:\u00a0<a href=\"https:\/\/consumer.ftc.gov\/articles\/job-scams\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/consumer.ftc.gov\/articles\/job-scams<\/a>.<\/li>\n\n\n\n<li>Please see Career and Employment Services\u2019 guide on Job Search Scams: <a href=\"https:\/\/ces.pugetsound.edu\/ces-guides\/\">https:\/\/ces.pugetsound.edu\/ces-guides\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: joseph.messina[@]live[.]law[.]cuny[.]edu<br><strong>Subject:<\/strong> Research Assistants<br><strong>Subject<\/strong>: Paid Remote Research Roles for Students<br><strong>Subject<\/strong>: Remote Research Assistant Opportunity<br><strong>Subject<\/strong>: Remote Research Assistant<\/p>\n\n\n\n<p>Dear Students,<\/p>\n\n\n\n<p>We are seeking dedicated and computer-savvy students (both graduates and undergraduates) from various departments to assist with our ongoing research initiatives. This remote position offers a valuable opportunity to contribute to exciting research projects.<\/p>\n\n\n\n<p>Research Initiative Details:<\/p>\n\n\n\n<p>&#8211; Compensation: $350 weekly<\/p>\n\n\n\n<p>&#8211; Requirements: Strong computer skills and proficiency<\/p>\n\n\n\n<p>&#8211; Availability: Limited positions, filled on a first-come, first-served basis<\/p>\n\n\n\n<p>If you are interested in this opportunity, kindly contact Professor Gareth Barkin via text at 831-226-6583 . When applying, kindly provide the following information:<\/p>\n\n\n\n<p>&#8211; Full name<\/p>\n\n\n\n<p>&#8211; Alternative email address<\/p>\n\n\n\n<p>&#8211; Field of study<\/p>\n\n\n\n<p>We look forward to hearing from you.<\/p>\n\n\n\n<p>Best regards,<\/p>\n\n\n\n<p>Dr. Gareth Barkin, Ph.D.<br>Professor, Sociology and Anthropology<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: joseph.messina[@]live[.]law[.]cuny[.]eduSubject: Research AssistantsSubject: Paid Remote Research Roles for StudentsSubject: Remote Research Assistant OpportunitySubject: Remote Research Assistant Tips for Detection Text of Phishing Message From: joseph.messina[@]live[.]law[.]cuny[.]eduSubject: Research AssistantsSubject: Paid Remote Research Roles for StudentsSubject: Remote Research Assistant OpportunitySubject: Remote Research Assistant Dear Students, We are seeking dedicated and computer-savvy students (both graduates [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1353"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1353\/revisions"}],"predecessor-version":[{"id":1355,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1353\/revisions\/1355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1354"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}