  {"id":1334,"date":"2026-02-10T16:30:29","date_gmt":"2026-02-10T21:30:29","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=1334"},"modified":"2026-02-16T13:19:47","modified_gmt":"2026-02-16T18:19:47","slug":"your-account-may-be-suspended","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2026\/02\/10\/your-account-may-be-suspended\/","title":{"rendered":"YOUR ACCOUNT MAY BE SUSPENDED"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.montclair.edu\/phish-files\/wp-content\/uploads\/sites\/290\/2026\/02\/Screenshot-2026-02-10-at-4.24.39\u202fPM.png\" alt=\"Screenshot of a form being utilized in a phishing attack asking for credentials.\" width=\"794\" height=\"450\" \/><\/p>\n<p data-start=\"217\" data-end=\"450\">Cybercriminals are sending emails claiming students must verify their school portal accounts to access new features or avoid losing academic information. These messages are designed to steal login credentials and compromise accounts.<\/p>\n<h2 data-start=\"457\" data-end=\"498\">Why This Email May Look Legitimate<\/h2>\n<ul data-start=\"500\" data-end=\"800\">\n<li data-start=\"500\" data-end=\"568\">\n<p data-start=\"502\" data-end=\"568\">Mentions Montclair systems like student portals and assessments<\/p>\n<\/li>\n<li data-start=\"569\" data-end=\"643\">\n<p data-start=\"571\" data-end=\"643\">Creates urgency by threatening account issues or loss of academic work<\/p>\n<\/li>\n<li data-start=\"644\" data-end=\"707\">\n<p data-start=\"646\" data-end=\"707\">Includes real Montclair IT contact or location information<\/p>\n<\/li>\n<li data-start=\"708\" data-end=\"800\">\n<p data-start=\"710\" data-end=\"800\">Appears to come from a real university email account (in this case, a compromised account)<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"807\" data-end=\"842\">Signs This Email Is Phishing<\/h2>\n<ul data-start=\"844\" data-end=\"1137\">\n<li data-start=\"844\" data-end=\"914\">\n<p data-start=\"846\" data-end=\"914\">Contains poor grammar, awkward wording, and unusual capitalization<\/p>\n<\/li>\n<li data-start=\"915\" data-end=\"981\">\n<p data-start=\"917\" data-end=\"981\">Requests account verification through an unexpected email link<\/p>\n<\/li>\n<li data-start=\"982\" data-end=\"1058\">\n<p data-start=\"984\" data-end=\"1058\">Includes a link that leads to a fake login or credential harvesting form<\/p>\n<\/li>\n<li data-start=\"1059\" data-end=\"1137\">\n<p data-start=\"1061\" data-end=\"1137\">Uses pressure tactics to make users act quickly without verifying legitimacy<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"1144\" data-end=\"1177\">Risks of Clicking the Link<\/h2>\n<p data-start=\"1179\" data-end=\"1247\">Entering credentials into the malicious form may allow attackers to:<\/p>\n<ul data-start=\"1249\" data-end=\"1448\">\n<li data-start=\"1249\" data-end=\"1288\">\n<p data-start=\"1251\" data-end=\"1288\">Access to Montclair email and systems<\/p>\n<\/li>\n<li data-start=\"1289\" data-end=\"1342\">\n<p data-start=\"1291\" data-end=\"1342\">Send phishing emails from the compromised account<\/p>\n<\/li>\n<li data-start=\"1343\" data-end=\"1397\">\n<p data-start=\"1345\" data-end=\"1397\">Steal academic, personal, or financial information<\/p>\n<\/li>\n<li data-start=\"1398\" data-end=\"1448\">\n<p data-start=\"1400\" data-end=\"1448\">Spread malware or additional scams across campus<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"1455\" data-end=\"1484\">How To Protect Yourself<\/h2>\n<ul data-start=\"1486\" data-end=\"1798\">\n<li data-start=\"1486\" data-end=\"1550\">\n<p data-start=\"1488\" data-end=\"1550\">Do not click links in unexpected account verification emails<\/p>\n<\/li>\n<li data-start=\"1551\" data-end=\"1624\">\n<p data-start=\"1553\" data-end=\"1624\">Access Montclair systems only through official websites or bookmarks<\/p>\n<\/li>\n<li data-start=\"1625\" data-end=\"1667\">\n<p data-start=\"1627\" data-end=\"1667\">Carefully check sender email addresses<\/p>\n<\/li>\n<li data-start=\"1668\" data-end=\"1740\">\n<p data-start=\"1670\" data-end=\"1740\">Report suspicious messages using the <a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 Phish Alert Button (PAB)<\/a><\/p>\n<\/li>\n<\/ul>\n<h2>Additional Notes:<\/h2>\n<ul>\n<li><strong>Remember<\/strong><strong>:<\/strong>\u00a0Information Technology will never text you. We will also never request your password or Duo codes,\u00a0<strong>ever<\/strong>.<\/li>\n<li>Information Technology will <strong data-start=\"1865\" data-end=\"1872\">not<\/strong> ask you to verify accounts or submit passwords through unofficial forms or unexpected email links.<\/li>\n<li>Do you think you\u2019ve fallen for a scam? Did you share personal information? Downloaded malicious content? Please contact the IT Service Desk at\u00a0<a href=\"tel:973-655-7971\">973-655-7971<\/a>\u00a0option 1 or email\u00a0<a href=\"mailto:itservicedesk@montclair.edu\">itservicedesk@montclair.edu<\/a>.<\/li>\n<li>Use the\u00a0<a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 Phish Alert Button (PAB)<\/a>\u00a0to report malicious emails directly to the Information Security team for review. If you are not using the Gmail client please forward the email to\u00a0<a href=\"mailto:phishfiles@montclair.edu\">phishfiles@montclair.edu<\/a>.<\/li>\n<li>Always use the \u201chover over\u201d technique to check web links before clicking! For more security tips please visit our\u00a0<a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/\">Security Tips<\/a>\u00a0page.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are sending emails claiming students must verify their school portal accounts to access new features or avoid losing academic information. These messages are designed to steal login credentials and compromise accounts. Why This Email May Look Legitimate Mentions Montclair systems like student portals and assessments Creates urgency by threatening account issues or loss of [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":1335,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=1334"}],"version-history":[{"count":3,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1334\/revisions"}],"predecessor-version":[{"id":1382,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1334\/revisions\/1382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/1335"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=1334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=1334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=1334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}