{"id":378,"date":"2021-04-26T08:53:14","date_gmt":"2021-04-26T15:53:14","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=378"},"modified":"2021-04-26T08:54:12","modified_gmt":"2021-04-26T15:54:12","slug":"phishing-from-4-25-21-important-pugetsound-notification-14-incoming-emails-rejected","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/378","title":{"rendered":"Phishing from 4\/25\/21: &#8220;Important pugetsound Notification- 14 Incoming emails rejected&#8221;"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Note: If you received an email message with the indicators below, please simply delete the email and <strong><em>do not<\/em><\/strong> open the attachment. The email is not legitimate. <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>From: <\/strong>pugetsound | Message_Solutions HelpDesk &lt;ines.glogowski[@]vub[.]be&gt;<br><strong>Subject:<\/strong> Important pugetsound Notification- 14 Incoming emails rejected<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The message body simply states &#8220;Recovery process above.&#8221; The email contains a .HTM attachment named &#8220;Recover 14 Rejected Emails.htm&#8221;. Do not click the attachment or open it. If you opened the attachment, please call the Service Desk at 253-879-8585 for assistance. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: If you received an email message with the indicators below, please simply delete the email and do not open the attachment. The email is not legitimate. From: pugetsound | Message_Solutions HelpDesk &lt;ines.glogowski[@]vub[.]be&gt;Subject: Important pugetsound Notification- 14 Incoming emails rejected The message body simply states &#8220;Recovery process above.&#8221; The email contains a .HTM attachment named [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":2,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/378\/revisions"}],"predecessor-version":[{"id":380,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/378\/revisions\/380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/320"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}