{"id":492,"date":"2013-02-25T08:57:48","date_gmt":"2013-02-25T14:57:48","guid":{"rendered":"http:\/\/sites.augsburg.edu\/it\/?p=492"},"modified":"2025-08-11T09:19:27","modified_gmt":"2025-08-11T14:19:27","slug":"phishing-when-at-first-you-succeed-try-and-try-again","status":"publish","type":"post","link":"https:\/\/sites.augsburg.edu\/it\/2013\/02\/25\/phishing-when-at-first-you-succeed-try-and-try-again\/","title":{"rendered":"Phishing &#8211; when at first you succeed, try and try again"},"content":{"rendered":"<h2>Let&#8217;s try again.<\/h2>\n<p>The <a title=\"Phishing \u2013 emails that try to get your password\" href=\"http:\/\/sites.augsburg.edu\/it\/2013\/02\/13\/phishing-emails-that-try-to-get-your-password\/\">phishing attack from about 2 weeks ago<\/a> is back and it brought friends.\u00a0 The email is nearly the same too.\u00a0 The last attack did trick some people so they might have thought they&#8217;d try it again.\u00a0 Here is the first email from today:<\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.23.21-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-493\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.23.21-AM.png\" alt=\"Screen shot 2013-02-25 at 8.23.21 AM\" width=\"538\" height=\"213\" \/><\/a><\/p>\n<p>This time they fixed the typo.\u00a0 Did you catch it <a title=\"Phishing \u2013 emails that try to get your password\" href=\"http:\/\/sites.augsburg.edu\/it\/2013\/02\/13\/phishing-emails-that-try-to-get-your-password\/\">last time<\/a>?\u00a0 I&#8217;ll review the phishy aspects of this email.\u00a0 All of these are red flags that should make you suspicious.\u00a0 If you feel suspicious then it is likely a scam and you can delete it.\u00a0 Always feel free to ask us too.<\/p>\n<ol>\n<li>You are being asked to login and update your email address.<\/li>\n<li>The subject is pretty generic.<\/li>\n<li>The From is miami.edu and not augsburg.edu.<\/li>\n<li>The message is not TO: you, it is BC: (blind carbon copied) at you.<\/li>\n<li>If you clicked on the link (which you should not!) it goes to\u00a0www.verderural.com.br which looks a bit odd.<\/li>\n<\/ol>\n<p>Shortly after the above email another phishing email was sent that represents a more standard attack.<\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-10.21.01-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-503\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-10.21.01-AM.png\" alt=\"Screen shot 2013-02-25 at 10.21.01 AM\" width=\"587\" height=\"374\" \/><\/a><\/p>\n<p>Let&#8217;s count the red flags.<\/p>\n<ol>\n<li>The subject is pretty generic.<\/li>\n<li>The From is info@security.com (not the IRS).<\/li>\n<li>There is an urgency to the message and it involves taxes.\u00a0 Why would you need to visit a website about tax forms within 48 hours?<\/li>\n<li>The web address actually goes to a totally different website (see below).<\/li>\n<\/ol>\n<h2>About the web address.<\/h2>\n<p>Many email programs allow you to move your mouse over the link <strong>without<\/strong> clicking on it.\u00a0 That way you can see where the link will go <strong>before<\/strong> clicking on it.\u00a0 My GroupWise client shows the link at the bottom of the email window (shown below).\u00a0 In both cases the actual destination is not the same as what the link appears to be in the email (big red flag).<\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.41.18-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-495\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.41.18-AM.png\" alt=\"Screen shot 2013-02-25 at 8.41.18 AM\" width=\"663\" height=\"301\" \/><\/a><\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-10.21.01-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-503\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-10.21.01-AM.png\" alt=\"Screen shot 2013-02-25 at 10.21.01 AM\" width=\"587\" height=\"374\" \/><\/a><\/p>\n<p>This time I took a picture of the first login page before we blocked it on campus.\u00a0 They made a copy of one of our web pages to try to fool you.<\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.17.29-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Screen-shot-2013-02-25-at-8.17.29-AM.png\" alt=\"Screen shot 2013-02-25 at 8.17.29 AM\" width=\"733\" height=\"523\" \/><\/a><\/p>\n<p>Even though the page doesn&#8217;t have any Augsburg logos it looks rather official.\u00a0 But again, if you did click on the link (<strong>which you should not do!<\/strong>) notice the web address in the browser address bar at the top.\u00a0 There is nothing there that looks familiar and the .br (Brazil!) should be a big red flag.<\/p>\n<p>The second phishing email&#8217;s website is very very tricky. See below.<\/p>\n<p><a href=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Capture2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-504\" src=\"http:\/\/sites.augsburg.edu\/it\/files\/2013\/02\/Capture2.png\" alt=\"Capture2\" width=\"700\" height=\"628\" \/><\/a><\/p>\n<p>Let&#8217;s see what red flags exist on this web page.<\/p>\n<ol>\n<li>The address in the address bar is .br (Brazil).\u00a0 That should be a big red flag.<\/li>\n<li>The web page is asking for your Social Security Number and birth date.\u00a0 Those should set off your alarms right away.\u00a0 Those two pieces of information are critical to your personal information security.\u00a0 You should never be entering those online in response to an email.\u00a0 Those two pieces of information are the keys that gain entry into your whole personal financial world &#8212; guard them like they are made of gold.<\/li>\n<\/ol>\n<h2>What should I do if I did enter my password?<\/h2>\n<ol>\n<li>The first thing you should do is go change your password on <a title=\"Student Help\" href=\"http:\/\/sites.augsburg.edu\/\" target=\"_blank\" rel=\"noopener\">Inside Augsburg<\/a>.<\/li>\n<li>Don\u2019t worry if you can\u2019t login to change your password \u2014 try to use the \u201cForgot password\u201d link to reset it.<\/li>\n<li>If you can\u2019t reset it just call the <a title=\"Classrooms Help\" href=\"http:\/\/sites.augsburg.edu\/techdesk\" target=\"_blank\" rel=\"noopener\">Tech Desk<\/a> or <a title=\"Faculty and Staff Help (LFCs)\" href=\"http:\/\/sites.augsburg.edu\/it\/get-help\/faculty-and-staff-support-lfcs\/\" target=\"_blank\" rel=\"noopener\">your LFC<\/a> to get your account unlocked.\u00a0 It is <strong>very likely<\/strong> that if you gave up your password that they are already sending spam and Augsburg IT will detect the 100s of emails being sent and will have changed your password to lock out the phishing attacker.<\/li>\n<li>After you have changed your password be sure to update your phone and other mobile devices with the new password.<\/li>\n<\/ol>\n<p>And to illustrate again, here is another student video this time from CalPoly Pomona.<\/p>\n<p><iframe loading=\"lazy\" title=\"CalPoly Ponona Video\" src=\"http:\/\/www.youtube.com\/embed\/HWJnx-R47A4\" name=\"CalPoly Ponona Video\" width=\"480\" height=\"360\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s try again. The phishing attack from about 2 weeks ago is back and it brought friends.\u00a0 The email is nearly the same too.\u00a0 The last attack did trick some people so they might have thought they&#8217;d try it again.\u00a0 Here is the first email from today: This time they fixed the typo.\u00a0 Did you &hellip; <a href=\"https:\/\/sites.augsburg.edu\/it\/2013\/02\/25\/phishing-when-at-first-you-succeed-try-and-try-again\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing &#8211; when at first you succeed, try and try again&#8221;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,3],"tags":[],"class_list":["post-492","post","type-post","status-publish","format-standard","hentry","category-phishing","category-security"],"_links":{"self":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":16,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/492\/revisions"}],"predecessor-version":[{"id":1567,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/posts\/492\/revisions\/1567"}],"wp:attachment":[{"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/media?parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/categories?post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.augsburg.edu\/it\/wp-json\/wp\/v2\/tags?post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}