{"id":210,"date":"2020-12-22T11:44:10","date_gmt":"2020-12-22T19:44:10","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/infosec\/?p=210"},"modified":"2020-12-22T11:44:12","modified_gmt":"2020-12-22T19:44:12","slug":"phishing-from-12-22-2020-taylor-fricton-pllc-0001","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/210","title":{"rendered":"Phishing from 12\/22\/2020: &#8220;Taylor Fricton, PLLC {0001}&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message and Phishing Link<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-1024x529.png\" alt=\"\" class=\"wp-image-211\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-1024x529.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-300x155.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-768x397.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-1536x793.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish-1440x744.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2020\/12\/12-22-20-sharepoint-document-phish.png 1685w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Always use caution when clicking links in unexpected emails especially when they are from a sender you do not know. <\/li><li>The link in this email leads to replawyersharepointdocument[.]doodlekit[.]com. This is not a legitimate document sharing site. <\/li><li>Beware of fake document sharing emails as they are extremely prevalent. Usually, legitimate document sharing emails will not include a pictorial preview of the shared document. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p>NEW DOCUMENTS RECEIVED<\/p>\n\n\n\n<p>A document has been sent to you.<\/p>\n\n\n\n<p>Number of pages: 02<br>Reference #: 44-91630206105500-00<\/p>\n\n\n\n<p>Click below image to view document<\/p>\n\n\n\n<p>Preview Document here<\/p>\n\n\n\n<p>Taylor Fricton, PLLC<br>7300 Metro Blvd. Suite 350<br>Edina, MN 55439<br>612.904.7376<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message and Phishing Link Tips for Detection Always use caution when clicking links in unexpected emails especially when they are from a sender you do not know. The link in this email leads to replawyersharepointdocument[.]doodlekit[.]com. This is not a legitimate document sharing site. Beware of fake document sharing emails as they are extremely [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":211,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/210\/revisions\/212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/211"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}