{"id":145,"date":"2020-10-27T09:56:52","date_gmt":"2020-10-27T16:56:52","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/infosec\/?p=145"},"modified":"2023-02-09T12:04:05","modified_gmt":"2023-02-09T20:04:05","slug":"simulated-phishing-breakdown-5","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/simulated-phishing\/145","title":{"rendered":"NCSAM 2020: Simulated Phishing Breakdown #3 &#8211; Faculty\/Staff"},"content":{"rendered":"<blockquote><p><em>If you were redirected here after entering your credentials, please read on to learn why the email you received was phishing. <strong>Don\u2019t worry!<\/strong> This was a <strong>simulated<\/strong> phishing attempt so your credentials are safe. However, if the situation were real, the information you entered would now be in the hands of a cybercriminal.<\/em><\/p><\/blockquote>\n<p><em>The email you received was sent by Technology Services to simulate a real phishing email as part of National Cyber Security Awareness Month. <\/em><em> Visit <a href=\"https:\/\/www.pugetsound.edu\/about\/offices-services\/technology-services\/online-security-protect-your-personal-information\/2020-national-cyber-security-awareness-month\/\" target=\"_blank\" rel=\"noopener\">pugetsound.edu\/NCSAM2020<\/a> for more information. <\/em><em>The goal of simulated phishing is to provide an interactive way for campus members to learn how to quickly recognize and handle phishing emails.<\/em><\/p>\n<h2>What was suspicious about this email?<\/h2>\n<ul>\n<li><strong>Were you expecting it?<\/strong> If you were not expecting a shared document, use caution before clicking links or opening attachments.<\/li>\n<li><strong>Did it seem overly vague? <\/strong>There is no name associated with who shared the document which should be suspicious. Something generic like &#8220;committeechair&#8221; or &#8220;departmentchair&#8221; are frequently used in phishing attacks. Further, the document title seems vague enough to seem relevant to anyone.<\/li>\n<li><strong>Was the email address from Google? <\/strong>If you look closely at the sending email address, it was sent from the domain &#8220;gooogel.net&#8221; instead of &#8220;google.com.&#8221;<\/li>\n<li><strong>Did you notice an odd character? <\/strong>In the first line of the message, the email address listed is &#8220;pugets\u00f8und.xyz&#8221;. Attackers frequently use homoglyphs (i.e. characters that appear almost identical or similar) to impersonate organizations. Look out for deliberately mispelled company names or homoglyphs in email addresses and URLs.<\/li>\n<li><strong>Did the link go to Google Drive? <\/strong>If you hover over the link to open the document, you&#8217;ll notice that the link leads to pugetsound.xyz. That is neither the university&#8217;s website nor the website for Google Drive which should be a red flag.<\/li>\n<li><strong>Did information seem mismatched? <\/strong>The email states there is a new document. However, the logo is for Google Sheets, not Google Docs. It also again lists Google Sheets above the mailing address.<\/li>\n<\/ul>\n<h2>Didn&#8217;t the link take me to Google?<\/h2>\n<p>Nope! Just because a website has the logo of the company you are expecting does <em><strong>not<\/strong><\/em> mean it is legitimate. Be especially careful on sites where you enter your username and password. If you enter your username\/password on a website from a phishing email, your account and password are likely compromised. Always double check the URL. In this case, the URL was pugetsound.xyz whereas it should have been accounts.google.com.<\/p>\n<h4>Fake Google Login Page<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-138\" src=\"http:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin.png\" alt=\"\" width=\"1635\" height=\"871\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin.png 1635w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin-300x160.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin-768x409.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin-1024x546.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-signin-1440x767.png 1440w\" sizes=\"auto, (max-width: 1635px) 100vw, 1635px\" \/><\/p>\n<h4>Real Google Login Page<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139\" src=\"http:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/real-google-sign-in-page.png\" alt=\"\" width=\"544\" height=\"595\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/real-google-sign-in-page.png 544w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/real-google-sign-in-page-274x300.png 274w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/p>\n<h2>How do I spot other document sharing phishing messages?<\/h2>\n<p><strong>Know the deal real! <\/strong>For legitimate shared Google documents, expect the message to be sent with a display name like this: &#8220;Jane Logger (via Google Docs).&#8221; The sending email address should be: &#8220;drive-shares-noreply@google.com.&#8221;<\/p>\n<p><strong>If a linked document is password protected, think twice. <\/strong>Many phishing emails use legitimate cloud sharing services such as Google Drive or Microsoft OneDrive. Normally, a file is scanned for viruses before it is uploaded to a cloud service. However, if the file is password protected, the automatic malware scan cannot occur. If you receive a link to a cloud storage site and the email includes a password to unlock the file, use caution. You might be downloading malware onto your computer by clicking the link and unlocking the file.<\/p>\n<h2>Original Simulated Phishing Message<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-136\" src=\"http:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share.png\" alt=\"\" width=\"1572\" height=\"718\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share.png 1572w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share-300x137.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share-768x351.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share-1024x468.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/10\/10-26-20-fake-google-doc-share-1440x658.png 1440w\" sizes=\"auto, (max-width: 1572px) 100vw, 1572px\" \/><\/p>\n<h2>Text of Simulated Phishing Message<\/h2>\n<p>committeechair @ pugets\u00f8und.xyz has invited you to <strong>edit<\/strong> the following document:<\/p>\n<p>Revised Proposal<\/p>\n<p>[First Name], please review this revised proposal at your earliest convenience.<\/p>\n<p>Open in Docs<\/p>\n<p>Google Sheets: Create and edit spreadsheets online.<br \/>\nGoogle LLC, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you were redirected here after entering your credentials, please read on to learn why the email you received was phishing. Don\u2019t worry! This was a simulated phishing attempt so your credentials are safe. However, if the situation were real, the information you entered would now be in the hands of a cybercriminal. The email [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3],"class_list":["post-145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-simulated-phishing","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":4,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/145\/revisions"}],"predecessor-version":[{"id":982,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/145\/revisions\/982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/141"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}