{"id":1439,"date":"2026-04-22T14:15:43","date_gmt":"2026-04-22T21:15:43","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=1439"},"modified":"2026-04-22T14:15:43","modified_gmt":"2026-04-22T21:15:43","slug":"phishing-from-4-22-2026-employee-assessment-analysls","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/1439","title":{"rendered":"Phishing from 4\/22\/2026: &#8220;EMPLOYEE ASSESSMENT ANALYSlS&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong>From:<\/strong> Valentina Hernandez &lt;ana[.]herediahernandez[@]austinisd[.]org&gt;<br><strong>Subject: <\/strong>EMPLOYEE ASSESSMENT ANALYSlS<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-1024x297.png\" alt=\"\" class=\"wp-image-1441\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-1024x297.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-300x87.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-768x223.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-1536x446.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1-1440x418.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-1.png 1905w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Where did the link lead?<\/p>\n\n\n\n<p>The link led to a form asking for your credentials. Never submit your credentials in an online form or on websites you do not recognize. Though Jotform is a legitimate site that allows individuals to create forms, the service can be maliciously used by attackers. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link-1024x586.png\" alt=\"\" class=\"wp-image-1442\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link-1024x586.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link-300x172.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link-768x440.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link-1440x824.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2026\/04\/4-22-26-employee-assessment-phish-link.png 1497w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Legitimate emails from Human Resources will generally come from an @pugetsound.edu email address. The sender&#8217;s email address is from an external domain. <\/li>\n\n\n\n<li>Does the sender work for the university? Are you expecting this email?<\/li>\n\n\n\n<li>Notice that the word &#8220;analysis&#8221; in the subject line is spelled &#8220;analysls&#8221; to likely avoid spam filter detection. Attackers commonly substitute lookalike characters or images to avoid text-based content filters. <\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From:<\/strong> Valentina Hernandez &lt;ana[.]herediahernandez[@]austinisd[.]org&gt;<br><strong>Subject: <\/strong>EMPLOYEE ASSESSMENT ANALYSlS<\/p>\n\n\n\n<p>Dear Employee,<br>We are pleased to announce that the Human Resources Department has finalized the performance assessment process for all employees. This is a significant milestone in our ongoing commitment to your professional development and growth within the organization.<\/p>\n\n\n\n<p>Attached to this mail is your report, offering valuable feedback and insights regarding your performance. The report will outline your strengths, identify areas for improvement, and clarify our expectations for your future contributions.<\/p>\n\n\n\n<p>CLICK HERE TO ACCESS REPORT<\/p>\n\n\n\n<p>We encourage you to take the time to review your report thoroughly and address any questions or feedback with your manager.<\/p>\n\n\n\n<p>Best regards,<br>HR DEPARTMENT.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From: Valentina Hernandez &lt;ana[.]herediahernandez[@]austinisd[.]org&gt;Subject: EMPLOYEE ASSESSMENT ANALYSlS Where did the link lead? The link led to a form asking for your credentials. Never submit your credentials in an online form or on websites you do not recognize. Though Jotform is a legitimate site that allows individuals to create forms, the service can [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":1441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-1439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=1439"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1439\/revisions"}],"predecessor-version":[{"id":1443,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/1439\/revisions\/1443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/1441"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=1439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=1439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=1439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}