{"id":431,"date":"2021-07-27T17:09:58","date_gmt":"2021-07-28T00:09:58","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=431"},"modified":"2021-07-27T17:09:59","modified_gmt":"2021-07-28T00:09:59","slug":"phishing-from-7-27-21-are-you-available","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/431","title":{"rendered":"Phishing from 7\/27\/21: &#8220;Are. you available&#8230;&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>Note: If you received this message, please simply delete it and do not reply with any information. The email is not legitimate. <\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"302\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/07\/7-27-21-impersonation-phish-1024x302.png\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/07\/7-27-21-impersonation-phish-1024x302.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/07\/7-27-21-impersonation-phish-300x88.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/07\/7-27-21-impersonation-phish-768x226.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/07\/7-27-21-impersonation-phish.png 1059w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Though the email address was spoofed to appear like an @pugetsound.edu address, notice the &#8220;Caution&#8221; banner appended to the message. If you see this banner, the email originates from outside the University of Puget Sound. Therefore, the mismatch should raise a red flag. <\/li><li>When you reply to an email, notice if the reply-to address does not match the sender email address. <\/li><li>If asked for information about students, please remember the regulations regarding FERPA. For more information about FERPA, please see <a href=\"https:\/\/www.pugetsound.edu\/ferpa-tutorial\">https:\/\/www.pugetsound.edu\/ferpa-tutorial<\/a>. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>Subject: <\/strong>Are. you available&#8230;<\/p>\n\n\n\n<p>Please send me the list of graduate students. Names and email addresses.<br>Thank you,<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: If you received this message, please simply delete it and do not reply with any information. The email is not legitimate. Tips for Detection Though the email address was spoofed to appear like an @pugetsound.edu address, notice the &#8220;Caution&#8221; banner appended to the message. If you see this banner, the email [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-431","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/431\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/431\/revisions\/433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/432"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}