{"id":738,"date":"2022-05-18T08:31:57","date_gmt":"2022-05-18T15:31:57","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=738"},"modified":"2022-05-18T08:31:58","modified_gmt":"2022-05-18T15:31:58","slug":"phishing-from-5-18-22-impersonating-campus-members","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/738","title":{"rendered":"Phishing from 5\/18\/22 &#8211; Impersonating Campus Members"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>Note: If you receive similar messages, do not reply with your information and simply delete the message as it is NOT legitimate. Note the sender&#8217;s email address in comparison to the display name\/signature.<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"988\" height=\"444\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-18-22-impersonation-phish-2.png\" alt=\"\" class=\"wp-image-741\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-18-22-impersonation-phish-2.png 988w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-18-22-impersonation-phish-2-300x135.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/05\/5-18-22-impersonation-phish-2-768x345.png 768w\" sizes=\"auto, (max-width: 988px) 100vw, 988px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Note the sender&#8217;s email address. Frequently, attackers try to impersonate campus members by setting the display name of an external address as somebody like a department chair or VP and using their name in the email signature.<\/li><li>Notice the caution banner prepended to the message. The banner is added to messages that match patterns of other phishing attempts.<\/li><li>These types of emails typically lead to a scammer asking you to purchase gift cards. <\/li><li>If you are unsure about the legitimacy of these emails, contact the person via an alternate known method of communication (e.g. campus email address, office phone). <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From:<\/strong> dostaffboswell[@]gmail[.]com<\/p>\n\n\n\n<p>I\u2019m so tied up in an impromptu meeting right now, I would have preferred to call you but phone call is not allowed during the meeting and I need you to run an urgent task for me. Let me know if you can do this for me and send me a number I can text you on.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: If you receive similar messages, do not reply with your information and simply delete the message as it is NOT legitimate. Note the sender&#8217;s email address in comparison to the display name\/signature. Tips for Detection Note the sender&#8217;s email address. Frequently, attackers try to impersonate campus members by setting the display [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":741,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=738"}],"version-history":[{"count":1,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/738\/revisions"}],"predecessor-version":[{"id":742,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/738\/revisions\/742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/741"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}