{"id":785,"date":"2022-07-20T13:08:46","date_gmt":"2022-07-20T20:08:46","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=785"},"modified":"2022-07-20T16:21:04","modified_gmt":"2022-07-20T23:21:04","slug":"phishing-from-7-20-2022-its-portal","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/785","title":{"rendered":"Phishing from 7\/20\/2022: &#8220;ITS PORTAL&#8221; and &#8220;UPS its&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<p><strong><em>NOTE: If you received this message, please delete it and DO NOT click on any links. This message is NOT legitimate. <\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"490\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-1-1024x490.png\" alt=\"\" class=\"wp-image-787\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-1-1024x490.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-1-300x144.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-1-768x367.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-1.png 1202w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips for Detection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notice the maroon caution banner prepended to the message. This banner is added on messages that match patterns of other phishing attempts.<\/li><li>The email is not sent from an @pugetsound.edu address.<\/li><li>The entire body of the email is a hyperlinked image (instead of text) which should be suspicious. This is a method used by attackers to bypass email spam filters.<\/li><li>Hovering over the hyperlinked image reveals that the link does not take you to a pugetsound.edu site and instead goes to mecaniquepetitetfilles[.]ca\/salesadmin\/update.<\/li><li>Technology Services will not ask you to click a link to \u201cavoid login interruption.\u201d<\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Where Did the Link Lead?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-1024x546.png\" alt=\"\" class=\"wp-image-790\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-1024x546.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-300x160.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-768x410.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-1536x819.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link-1440x768.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/07\/7-20-22-its-portal-phish-link.png 1642w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p><strong>From: <\/strong>replen[@]gvsu[.]edu or ssterenberg[@]teampbs[.]com<br><strong>Subject: <\/strong>ITS PORTAL<\/p>\n\n\n\n<p>Your UPS account settings are out-of-date. To improve all student\/faculty\/staff account user experience, privacy policy update is required to avoid login interruption. <\/p>\n\n\n\n<p>Privacy Policy Action Required Now<\/p>\n\n\n\n<p>Visit <em>[link removed<\/em>]<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message NOTE: If you received this message, please delete it and DO NOT click on any links. This message is NOT legitimate. Tips for Detection Notice the maroon caution banner prepended to the message. This banner is added on messages that match patterns of other phishing attempts. The email is not sent from [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3],"class_list":["post-785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":4,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/785\/revisions"}],"predecessor-version":[{"id":793,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/785\/revisions\/793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/787"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}