{"id":1384,"date":"2025-12-03T07:36:59","date_gmt":"2025-12-03T15:36:59","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1384"},"modified":"2025-12-03T07:43:15","modified_gmt":"2025-12-03T15:43:15","slug":"phishing-from-12-3-2025-nicolas-landry-shared-university-of-puget-sound-december-appointment-notice-with-you","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1384","title":{"rendered":"Phishing from 12\/3\/2025: &#8220;Nicolas LANDRY shared &#8216;University of Puget Sound December Appointment Notice&#8217; with you&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>SharePoint Online &lt;no-reply[@]sharepointonline[.]com><br><strong>Subject:<\/strong> Nicolas LANDRY shared &#8220;University of Puget Sound December Appointment Notice&#8221; with you<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"473\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-1024x473.png\" alt=\"\" class=\"wp-image-1385\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-1024x473.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-300x139.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-768x355.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-1536x710.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish-1440x665.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2025\/12\/12-3-25-sharepoint-phish.png 1883w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This email was sent using Microsoft SharePoint. Attackers commonly use legitimate services to share documents that may contain a link to a malicious site or attachment. Always use caution opening secondary links in these shared documents or downloading files. <\/li>\n\n\n\n<li>The sender attempts to impersonate the president, but notice that the actual sender account name does not match.  <\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>SharePoint Online &lt;no-reply[@]sharepointonline[.]com><br><strong>Subject: <\/strong>Nicolas LANDRY shared &#8220;University of Puget Sound December Appointment Notice&#8221; with you<\/p>\n\n\n\n<p>Nicolas LANDRY shared a file with you<\/p>\n\n\n\n<p>President Isiaah Crawford sent you a file<\/p>\n\n\n\n<p>University of Puget Sound December Appointment Notice<\/p>\n\n\n\n<p>This link only works for the direct recipients of this message.<\/p>\n\n\n\n<p>Open<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: SharePoint Online &lt;no-reply[@]sharepointonline[.]com>Subject: Nicolas LANDRY shared &#8220;University of Puget Sound December Appointment Notice&#8221; with you Tips for Detection Text of Phishing Message From: SharePoint Online &lt;no-reply[@]sharepointonline[.]com>Subject: Nicolas LANDRY shared &#8220;University of Puget Sound December Appointment Notice&#8221; with you Nicolas LANDRY shared a file with you President Isiaah Crawford sent you a [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1384"}],"version-history":[{"count":4,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1384\/revisions"}],"predecessor-version":[{"id":1389,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1384\/revisions\/1389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1385"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}