{"id":404,"date":"2019-11-08T15:04:34","date_gmt":"2019-11-08T19:04:34","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=404"},"modified":"2019-11-08T15:04:34","modified_gmt":"2019-11-08T19:04:34","slug":"go-phish","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2019\/11\/08\/go-phish\/","title":{"rendered":"Go Phish!"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Defeating phishing emails and securing your inbox<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><em>This post is part of a series contributed by the ISO&#8217;s 2019-2020 student intern Emily Connolly, &#8217;20.<\/em><\/h4>\n\n\n\n<p>It\u2019s 8am on a Monday morning. You pour yourself a cup of coffee and open your laptop to read all the emails you\u2019ve been putting off since Friday afternoon.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"285\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture1.png\" alt=\"\" class=\"wp-image-405\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture1.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture1-300x199.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>This is you.<\/em><\/figcaption><\/figure>\n\n\n\n<p> When you open your mail inbox, this message is waiting: <\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture2.png\" alt=\"\" class=\"wp-image-406\" width=\"707\" height=\"368\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture2.png 943w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture2-300x156.png 300w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture2-768x400.png 768w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/figure>\n\n\n\n<p>\u201cOh no!\u201d you think. \u201cHave I not been getting my emails? What\ndoes this mean?\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"645\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture3.png\" alt=\"\" class=\"wp-image-407\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture3.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture3-200x300.png 200w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>Hmm. Now this is interesting.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Before doing anything, however, it\u2019s important to consider the threat of a <a rel=\"noreferrer noopener\" href=\"http:\/\/en.wikipedia.org\/wiki\/Phishing\" target=\"_blank\"><em>phishing scam<\/em><\/a>\u2014 an attempt to steal your UVM credentials (your NetID and password). A phishing scam often comes in the form of an email, perhaps one asking for you to enter your UVM credentials or offering a well-paying part-time job from a professor working overseas. <\/p>\n\n\n\n<p>Often times, phishing scams will try to play off your emotions\u2014such as a mail message threatening to delete your account, the idea of an easy side job, or a compromised UVM NetID. The goal is to get you to act fast, getting you to enter in your UVM credentials to solve the problem quickly without noticing the signs that the email you received isn\u2019t actually legitimate.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"285\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture4.png\" alt=\"\" class=\"wp-image-408\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture4.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture4-300x199.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>It&#8217;s time to be a detective!<\/em><\/figcaption><\/figure>\n\n\n\n<p>Here are some things to look for when you see a suspicious\nmessage:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Check the email subject. Has it been left blank? Is it vague? Does it use a \u201cscare-tactic\u201d to get you to act fast? Do you feel pressured?<\/li><li>Who is it being sent by? Is it not a UVM email? Is it someone you don\u2019t know? If it is someone you know, is it a strange request for them to have?<\/li><li>Where are the links going to? Any email that asks you to enter your UVM password on a non-UVM web site is a phishing scam. UVM will never ask you to enter your UVM NetID and password on a non-UVM web page\u2014even if it looks like a UVM page, and even if it&#8217;s on a reputable site, such as Google Docs, or if it contains UVM graphics and you&#8217;ve been directed there by an email that appears to come from a UVM email address. Remember: The UVM Tower logo or any related graphic is not a guarantor of legitimacy. <\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"350\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture5.png\" alt=\"\" class=\"wp-image-409\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture5.png 974w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture5-300x108.png 300w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture5-768x276.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/figure>\n\n\n\n<p>For example, this\nemail here is directing users to a Weebly site, and by mousing over the link,\nyou can see where the link will take you without clicking.<\/p>\n\n\n\n<ol start=\"4\"><li>Does the email have strange capitalizations or odd grammar and spelling? Is there no greeting or sign off? Does the signature not match the email sender?<\/li><li>Is money involved? Do they want me to help them pass checks or move money with the promise of payment afterward?<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"680\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture6-1024x680.png\" alt=\"\" class=\"wp-image-410\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture6-1024x680.png 1024w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture6-300x199.png 300w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture6-768x510.png 768w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture6.png 1066w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption><em>This email here contains the strange formatting and the promise of money. It&#8217;s a scam!<\/em><\/figcaption><\/figure>\n\n\n\n<ol start=\"6\"><li>Ask your friends. Does the email seem like a\nscam to them? Sometimes, taking a step back from the situation can help you\nthink more clearly.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"285\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture7.png\" alt=\"\" class=\"wp-image-411\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture7.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture7-300x199.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>&#8220;Harold, that&#8217;s not from UVM! They&#8217;ll never ask for you to enter your credentials on a non-UVM page!&#8221;<\/em><\/figcaption><\/figure>\n\n\n\n<p>If you\u2019re even unsure about the legitimacy of a message, you can contact the Computing Help Line at 656-2604, or&nbsp;<a href=\"https:\/\/footprints.uvm.edu\/etsgroup.html\">submit a help request online<\/a>. You can also directly contact the party involved by directly mailing the organization or office the email is purporting to be from, but not by replying to the suspicious email. Instead, use the email you have on file for the organization or the one they display publicly on their website.<\/p>\n\n\n\n<p>You can also report phishing emails by forwarding the phishing email with full headers to abuse@uvm.edu. (To forward a message with headers, please see <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/forwarding-full-mail-headers\">https:\/\/www.uvm.edu\/it\/kb\/article\/forwarding-full-mail-headers<\/a>)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What to do if you&#8217;ve fallen for a phishing scam<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"285\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture8.png\" alt=\"\" class=\"wp-image-412\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture8.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture8-300x199.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>Time to call the UVM Computing Helpline!<\/em><\/figcaption><\/figure>\n\n\n\n<p> If you&#8217;ve followed the link in the message, or replied to this email or one like it, you should&nbsp;<strong>change your password immediately<\/strong>&nbsp;at&nbsp;<a href=\"https:\/\/www.uvm.edu\/account\/\">www.uvm.edu\/account<\/a>. Contact the&nbsp;<a href=\"http:\/\/www.uvm.edu\/it\/help\/\">UVM Computing Helpline<\/a>&nbsp;if you need assistance changing your password. You should also change any similar passwords to your UVM password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">More info<\/h3>\n\n\n\n<p>For more information about phishing scams, view our Web page on&nbsp;<a href=\"http:\/\/www.uvm.edu\/it\/account\/?Page=protect.html\">protecting your NetID and password<\/a>.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"424\" src=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture9.png\" alt=\"\" class=\"wp-image-413\" srcset=\"https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture9.png 429w, https:\/\/blog.uvm.edu\/whysecurity\/files\/2019\/11\/Picture9-300x297.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption><em>Yahoo! You&#8217;re now ready to conquer the inbox!<\/em><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Defeating phishing emails and securing your inbox This post is part of a series contributed by the ISO&#8217;s 2019-2020 student intern Emily Connolly, &#8217;20. It\u2019s 8am on a Monday morning. You pour yourself a cup of coffee and open your laptop to read all the emails you\u2019ve been putting off since Friday afternoon. When you &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2019\/11\/08\/go-phish\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Go Phish!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4920,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[607,351621],"class_list":["post-404","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-phishing","tag-student_contributor","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Emily","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/econnol2\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/4920"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":6,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/404\/revisions"}],"predecessor-version":[{"id":419,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/404\/revisions\/419"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}