{"id":657,"date":"2022-02-22T09:01:39","date_gmt":"2022-02-22T17:01:39","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=657"},"modified":"2022-02-22T09:01:40","modified_gmt":"2022-02-22T17:01:40","slug":"phishing-from-2-21-2022-emergency","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/657","title":{"rendered":"Phishing from 2\/21\/2022: &#8220;Emergency&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>NOTE: If you received this message, please simply delete it as it is NOT legitimate. Do not click on links. As a reminder, never enter your credentials on online forms. <\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"344\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/02\/2-21-22-mailbox-full-phish.png\" alt=\"\" class=\"wp-image-658\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/02\/2-21-22-mailbox-full-phish.png 998w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/02\/2-21-22-mailbox-full-phish-300x103.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/02\/2-21-22-mailbox-full-phish-768x265.png 768w\" sizes=\"auto, (max-width: 998px) 100vw, 998px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice the \u201cCaution\u201d banner prepended to the message. <\/li><li>Legitimate messages from Technology Services will come from an <em>@pugetsound.edu<\/em> email address. Notices regarding email capacity are sent prior to a mailbox being 98% full.<\/li><li>Hovering overing the link reveals that the link goes to a page on <em>9a7da47f[.]sibforms[.]com<\/em>. Never enter your credentials in online forms. <\/li><li>If you are ever unsure whether your mailbox is full, you can log in to <strong>webmail.pugetsound.edu<\/strong> to check your current mailbox usage. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From<\/strong>: support[@]efficeresearch[.]com<br><strong>Subject:<\/strong> Emergency<\/p>\n\n\n\n<p>Your mailbox storage has reached 98% on the email server.Visit OutlookStorage Access Page and login to adjust and maintain your Mailbox storage.<\/p>\n\n\n\n<p>At 100% limit, these email features:<br>\u00b7 Sending messages<br>\u00b7 Receiving messages<br>\u00b7 Forwarding messages<br>Will not be available for your utilization.<\/p>\n\n\n\n<p>IT Help Desk<\/p>\n\n\n\n<p>(c) 2022 Admin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message NOTE: If you received this message, please simply delete it as it is NOT legitimate. Do not click on links. As a reminder, never enter your credentials on online forms. Tips for Detection Notice the \u201cCaution\u201d banner prepended to the message. Legitimate messages from Technology Services will come from an @pugetsound.edu email [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":658,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=657"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/657\/revisions"}],"predecessor-version":[{"id":659,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/657\/revisions\/659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/658"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}