{"id":474,"date":"2021-10-27T08:36:43","date_gmt":"2021-10-27T15:36:43","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=474"},"modified":"2021-10-27T08:36:46","modified_gmt":"2021-10-27T15:36:46","slug":"phishing-from-10-26-2021-you-have-a-new-voice-call","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/474","title":{"rendered":"Phishing from 10\/26\/2021: &#8220;You have a new voice call&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>Note: If you received this message, please delete it as it is NOT legitimate. Do not click any links. <\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"346\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/10\/10-26-21-voicemail-phish-1024x346.png\" alt=\"\" class=\"wp-image-475\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/10\/10-26-21-voicemail-phish-1024x346.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/10\/10-26-21-voicemail-phish-300x101.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/10\/10-26-21-voicemail-phish-768x259.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/10\/10-26-21-voicemail-phish.png 1030w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice the Caution banner added to the message. This banner is added on messages that may match previous phishing attempts. <\/li><li>The sender email address is not from an @pugetsound.edu address. <\/li><li>Notice the time mismatch between when the email was sent (12:23pm) and the alleged time the voicemail was received (2:23pm). Since notification emails such as these are generally automated, the timestamps would usually match. <\/li><li>The link would have taken you to a fake Outlook login page. Do not enter your Puget Sound credentials on sites you do not recognize or on any forms. <\/li><li>If you are unsure what legitimate voicemail notification emails look like for your campus phone, please contact the Service Desk for a detailed description. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From:<\/strong> pugetsound.edu Ring central Notification &lt;info[@]alkanaah-international[.]com><br><strong>Subject:<\/strong> You have a new voice call<\/p>\n\n\n\n<p>VN Time : 10\/26\/2021 02:23:14 pm<br>Reception Domain : pugetsound.edu<br>Caller-ID :(303) 452**** Caller-ID<br>Audio Length: 0.38<\/p>\n\n\n\n<p>Listen to your voiceaudio [<em>link removed<\/em>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: If you received this message, please delete it as it is NOT legitimate. Do not click any links. Tips for Detection Notice the Caution banner added to the message. This banner is added on messages that may match previous phishing attempts. The sender email address is not from an @pugetsound.edu address. [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/474\/revisions\/476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/475"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}