{"id":774,"date":"2022-07-20T08:27:33","date_gmt":"2022-07-20T15:27:33","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=774"},"modified":"2022-07-20T09:46:54","modified_gmt":"2022-07-20T16:46:54","slug":"phishing-from-7-20-2022-task","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/774","title":{"rendered":"Phishing from 7\/20\/2022: &#8220;Task&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>Note: Various campus members have reported emails impersonating department heads. These emails are NOT legitimate. Do not buy gift cards.<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"475\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-impersonation-gift-card-phish-1.png\" alt=\"\" class=\"wp-image-776\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-impersonation-gift-card-phish-1.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-impersonation-gift-card-phish-1-300x139.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-impersonation-gift-card-phish-1-768x356.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Always check the email address of the sender and note the email address when replying. The display name can be easily manipulated to impersonate somebody you know. Use caution especially on mobile devices since the full email address is generally hidden until you tap to see more info.<\/li><li>If an email seems suspicious or you don\u2019t know whether somebody is actually trying to contact you, reach out to them via a known means of communication (e.g. their Puget Sound email) or check with the Service Desk.<\/li><li>Emails similar to this typically result in the scammer asking you to purchase gift cards. Read more about gift card scams on the FTC website: <a href=\"https:\/\/consumer.ftc.gov\/articles\/gift-card-scams\">https:\/\/consumer.ftc.gov\/articles\/gift-card-scams<\/a>. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>exertcdrt1[@]gmail[.]com<br><strong>Subject: <\/strong>Task<\/p>\n\n\n\n<p>Good Morning.<br><br>Let me know your schedule this morning.<br><br>I will be going on a conference call this morning and i will need your help in getting a task done. &nbsp;<br><br>Thanks.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Note: Various campus members have reported emails impersonating department heads. These emails are NOT legitimate. Do not buy gift cards. Tips for Detection Always check the email address of the sender and note the email address when replying. The display name can be easily manipulated to impersonate somebody you know. Use caution [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=774"}],"version-history":[{"count":2,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/774\/revisions"}],"predecessor-version":[{"id":779,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/774\/revisions\/779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/776"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}