{"id":704,"date":"2022-05-03T08:34:19","date_gmt":"2022-05-03T15:34:19","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=704"},"modified":"2022-05-03T09:04:16","modified_gmt":"2022-05-03T16:04:16","slug":"phishing-from-5-3-2022-re-kindly-get-back-to-me-for-this-awaiting-funds","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/704","title":{"rendered":"Phishing from 5\/3\/2022: &#8220;Re: kindly get back to me for this awaiting funds.&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-3-22-financial-phish-1024x488.png\" alt=\"\" class=\"wp-image-705\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-3-22-financial-phish-1024x488.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-3-22-financial-phish-300x143.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-3-22-financial-phish-768x366.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-3-22-financial-phish.png 1094w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice the caution banner prepended to the top of the message. Messages with this banner match patterns of other phishing attempts. <\/li><li>If something seems too good to be true, it probably is! <\/li><li>Remember &#8211; do not send sensitive personal information or financial information over email or to individuals\/organizations you do not trust. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>larae7f[@]gmail[.]com OR marni3g[@]gmail[.]com<br><strong>Subject: <\/strong>Re: kindly get back to me for this awaiting funds.<\/p>\n\n\n\n<p>Dear Friend,<\/p>\n\n\n\n<p>My Name is Umit Cakir, a personal Accountant\/Executive board Member of Directors working with ILBANK of Turkey. A late investor left behind {Thirteen Million Five Hundred Thousand United States Dollars} with our Bank for some years and no Next of kin has come forward all these years for the claim.<\/p>\n\n\n\n<p>Please get back to me via my private email ( Umit.Cakir_[@]outlook[.]com ) as soon as possible for more details if you are interested in my offer,<\/p>\n\n\n\n<p>Best Regards,<\/p>\n\n\n\n<p>Umit Cakir<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Tips for Detection Notice the caution banner prepended to the top of the message. Messages with this banner match patterns of other phishing attempts. If something seems too good to be true, it probably is! Remember &#8211; do not send sensitive personal information or financial information over email or to individuals\/organizations you [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=704"}],"version-history":[{"count":3,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/704\/revisions"}],"predecessor-version":[{"id":709,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/704\/revisions\/709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/705"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}