{"id":873,"date":"2022-10-05T15:35:24","date_gmt":"2022-10-05T22:35:24","guid":{"rendered":"https:\/\/blogs.pugetsound.edu\/infosec\/?p=873"},"modified":"2023-02-01T12:08:11","modified_gmt":"2023-02-01T20:08:11","slug":"phishing-from-10-05-22-christopher-torres-shared-memo_-with-you","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/873","title":{"rendered":"PHISHING FROM 10\/05\/22: \u201cChristopher Torres shared &#8220;Memo_&#8221; with you.\u201d"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Original Phishing Message<\/h2>\n\n\n\n<p><strong>From:&nbsp;<\/strong>no-reply[@]sharepointonline[.]com<br><strong>Display name:<\/strong> Christopher Torres<br><strong>Subject:&nbsp;<\/strong>Christopher Torres shared &#8220;Memo_&#8221; with you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"470\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-1024x470.png\" alt=\"\" class=\"wp-image-875\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-1024x470.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-300x138.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-768x352.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-1536x704.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10-1440x660.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2022\/10\/Screenshot-10.png 1923w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Tips for Detection<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Though the email was sent from a legitimate Microsoft service (SharePoint), the email was sent from somebody outside the organization<\/li><li>Be wary of document shares that you are not expecting. Online collaboration tools are a frequent method of phishing attacks.<\/li><li>Many document share phishing emails contain enticing subject lines like &#8220;Memo&#8221;, \u201cDept Evaluation\u201d, \u201cDept Assessment\u201d, or \u201cAnnual Faculty Evaluations\u201d.<\/li><li>Though the links led to legitimate sites such as Microsoft SharePoint , the content displayed should be suspicious. Remember to NEVER enter passwords on online forms.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Text of Phishing Message<\/h2>\n\n\n\n<p><strong>From:&nbsp;<\/strong>no-reply[@]sharepointonline[.]com<br><strong>Display name:<\/strong> Christopher Torres<br><strong>Subject:&nbsp;<\/strong>Christopher Torres shared &#8220;Memo_&#8221; with you. <\/p>\n\n\n\n<p>Christopher Torres shared a file with you<\/p>\n\n\n\n<p>You have amessage from the admin<\/p>\n\n\n\n<p>Memo_<\/p>\n\n\n\n<p>This link will work for anyone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message From:&nbsp;no-reply[@]sharepointonline[.]comDisplay name: Christopher TorresSubject:&nbsp;Christopher Torres shared &#8220;Memo_&#8221; with you. Tips for Detection Though the email was sent from a legitimate Microsoft service (SharePoint), the email was sent from somebody outside the organization Be wary of document shares that you are not expecting. Online collaboration tools are a frequent method of phishing attacks. [&hellip;]<\/p>\n","protected":false},"author":643,"featured_media":875,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/643"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=873"}],"version-history":[{"count":2,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/873\/revisions"}],"predecessor-version":[{"id":877,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/873\/revisions\/877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/875"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}