{"id":224,"date":"2021-01-07T10:28:41","date_gmt":"2021-01-07T18:28:41","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/infosec\/?p=224"},"modified":"2021-01-07T10:28:42","modified_gmt":"2021-01-07T18:28:42","slug":"example-from-1-7-2021-hi","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/224","title":{"rendered":"Example from 1\/7\/2021: &#8220;Hi&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><em>Note: Multiple campus members received this email. The sender&#8217;s email address is the same (don42[@]hey.com), but the subject line may either be &#8220;Hi&#8221; or &#8220;Hello&#8221;. If you received this message, simply delete it.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"486\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/1-7-21-student-help-1024x486.png\" alt=\"\" class=\"wp-image-225\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/1-7-21-student-help-1024x486.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/1-7-21-student-help-300x143.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/1-7-21-student-help-768x365.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/1-7-21-student-help.png 1360w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Though this message looks quite innocent as it has no links or attachments and the sender&#8217;s end goal is unclear, it is <strong>not<\/strong> legitimate. Do not reply to this email. <\/li><li>If a dean at another university was truly emailing as a colleague, expect the email to come from a *<strong>.edu<\/strong> email address. A quick search on the Trinity Washington University website can also confirm that this individual is not the dean of professional studies.<\/li><li>The &#8220;To&#8221; line only contains the sender&#8217;s email which indicates this message was likely sent to a large number of individuals in the &#8220;BCC&#8221; field. The content of the message is inconsistent with a mass email.<\/li><li>The sender&#8217;s display name &#8220;Don Sousa&#8221; does not match the email signature of &#8220;Don Dousa.&#8221; <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p>Hello,<br><br>I have a student here that is in need of your help.<br><br>I will appreciate if you can schedule a time for us to talk. so that I can provide additional information?<br><br>Thank you!!<br><br>Don Dousa, PhD.<br>Executive Dean for the School of Professional Studies<br>Trinity Washington University<br>125 Michigan Ave. NE, Washington, DC 20017<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: Multiple campus members received this email. The sender&#8217;s email address is the same (don42[@]hey.com), but the subject line may either be &#8220;Hi&#8221; or &#8220;Hello&#8221;. If you received this message, simply delete it. Tips for Detection Though this message looks quite innocent as it has no links or attachments and the sender&#8217;s [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":225,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":226,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/224\/revisions\/226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/225"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}