{"id":550,"date":"2022-01-06T10:46:04","date_gmt":"2022-01-06T18:46:04","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=550"},"modified":"2022-01-06T10:46:06","modified_gmt":"2022-01-06T18:46:06","slug":"phishing-from-1-6-2022-a-quick-respond-asap","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/550","title":{"rendered":"Phishing from 1\/6\/2022: &#8220;A quick respond ASAP&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>NOTE: If you received this message, please simply delete it as it is NOT legitimate. Do not reply to the email or text the phone number included in the message. <\/em><\/strong><\/p>\n\n\n\n<p><strong>From:<\/strong> milliedemmy01[@]gmail[.]com<br><strong>Subject:<\/strong> A quick respond ASAP [<em>Firstname<\/em>] <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"996\" height=\"284\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/01\/1-6-22-impersonation-phish.png\" alt=\"\" class=\"wp-image-551\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/01\/1-6-22-impersonation-phish.png 996w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/01\/1-6-22-impersonation-phish-300x86.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/01\/1-6-22-impersonation-phish-768x219.png 768w\" sizes=\"auto, (max-width: 996px) 100vw, 996px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Always check the sender&#8217;s email address and do not solely rely on the display name. It is easy for attackers to modify the display name to impersonate a campus member. <\/li><li>Phishing emails asking you to complete a quick\/urgent task while attempting to impersonate the president, VPs, AVPs, or department chairs are extremely common. Many times, the attacker will ask you to purchase gift cards. <\/li><li>Notice the grammatical error in the subject line. <\/li><li>If you are unsure if an email came from somebody you know, contact them via a known alternate means of communication.<\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From:<\/strong> milliedemmy01[@]gmail[.]com<br><strong>Subject:<\/strong> A quick respond ASAP [<em>Firstname<\/em>]<\/p>\n\n\n\n<p>Send me your mobile phone number for an urgent task or text me on 840.888.1424<\/p>\n\n\n\n<p>Thanks,<\/p>\n\n\n\n<p>Isiaah Crawford<br>President<br>University of Puget Sound<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message NOTE: If you received this message, please simply delete it as it is NOT legitimate. Do not reply to the email or text the phone number included in the message. From: milliedemmy01[@]gmail[.]comSubject: A quick respond ASAP [Firstname] Tips for Detection Always check the sender&#8217;s email address and do not solely rely on [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=550"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/550\/revisions"}],"predecessor-version":[{"id":552,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/550\/revisions\/552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/551"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}