{"id":358,"date":"2021-04-01T10:28:01","date_gmt":"2021-04-01T17:28:01","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=358"},"modified":"2021-04-01T10:28:03","modified_gmt":"2021-04-01T17:28:03","slug":"phishing-from-3-31-21-request-access","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/358","title":{"rendered":"Phishing from 3\/31\/21: &#8220;Request Access&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>Note: If you received this message, you can simply delete it. The email is not legitimate. Please do not click on any links. <\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"404\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-1024x404.png\" alt=\"\" class=\"wp-image-359\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-1024x404.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-300x118.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-768x303.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-1536x606.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish-1440x568.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/04\/3-31-21-o365-keep-pw-phish.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice the &#8220;Caution&#8221; banner prepended to the message. <\/li><li>Technology Services will not ask you to click a link to keep your password.<\/li><li>Notice the sender&#8217;s email address and the suspicious link. Tip: Always hover over links or hyperlinked text in emails to determine what website the link will take you to. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p>From: erikam[@]naumanngroup[.]com<br>Subject: Request Access<\/p>\n\n\n\n<p>Office 365<\/p>\n\n\n\n<p>Hello [<em>username<\/em>]@pugetsound.edu,<br>Password for ([<em>username<\/em>]@pugetsound.edu) will expire in 2days Time<br>Keep My Current Password Update Below<\/p>\n\n\n\n<p>Keep Current password Here<\/p>\n\n\n\n<p>pugetsound.edu Support \u00a92021<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: If you received this message, you can simply delete it. The email is not legitimate. Please do not click on any links. Tips for Detection Notice the &#8220;Caution&#8221; banner prepended to the message. Technology Services will not ask you to click a link to keep your password. Notice the sender&#8217;s email [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/358\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/358\/revisions\/360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/359"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}