  {"id":1445,"date":"2026-02-18T12:42:03","date_gmt":"2026-02-18T17:42:03","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=1445"},"modified":"2026-02-18T12:42:03","modified_gmt":"2026-02-18T17:42:03","slug":"montclair-state-university-student-account-information-update","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2026\/02\/18\/montclair-state-university-student-account-information-update\/","title":{"rendered":"ÌÇÐÄvlog Student Account Information Update"},"content":{"rendered":"<p data-path-to-node=\"5\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.montclair.edu\/phish-files\/wp-content\/uploads\/sites\/290\/2026\/02\/BankMobile-Phish.png\" alt=\"Bank Mobile Phish asking for login credentials and banking information via a Microsoft Form.\" width=\"688\" height=\"746\" \/><\/p>\n<h2 data-path-to-node=\"5\">Why This Email May Look Legitimate<\/h2>\n<ul data-path-to-node=\"6\">\n<li>\n<p data-path-to-node=\"6,0,0\"><strong>Use of Official Names: <\/strong>The email mentions <strong>BMTX (BankMobile)<\/strong>, a service many universities actually use for disbursements.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"6,1,0\"><strong>Specific Dollar Amounts:<\/strong> Using a precise figure like <strong>$1,367.64<\/strong> creates a sense of realism and urgency.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"6,2,0\"><strong>Professional Formatting:<\/strong> It includes standard boilerplate language about &#8220;Identity Theft&#8221; and &#8220;Customer Service&#8221; to mimic a security-conscious organization.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"7\">Signs This Email Is Phishing<\/h2>\n<ul data-path-to-node=\"8\">\n<li>\n<p data-path-to-node=\"8,0,0\"><strong>Generic Greeting:<\/strong> Addressing the recipient as &#8220;Dear Student&#8221; instead of using a specific name is a major red flag for official financial communications.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"8,1,0\"><strong>External Senders:<\/strong> The email originates from non-university addresses and non-BMTX domains.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"8,2,0\"><strong>Nonsensical Procedures:<\/strong> The email asks you to update information with the <strong>IT Department<\/strong> to receive <strong>Financial Department<\/strong> funds. In a real scenario, the IT department does not handle student banking or tuition refunds.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"8,3,0\"><strong>Hosted on Public Forms:<\/strong> The link leads to a <strong>Microsoft Forms<\/strong> page. Official banking or university business will always be conducted through a secure, proprietary portal, never a free public form tool (like Google Forms or Microsoft Forms).<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"8,4,0\"><strong>Punctuation and Grammar: <\/strong>Random capitalization (e.g., &#8220;All funds,&#8221; &#8220;Verify and Update&#8221;) and awkward phrasing are common in phishing templates.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"9\">Risks of Clicking the Link<\/h2>\n<p data-path-to-node=\"10\">If you click the link and fill out the form, you are handing your sensitive data directly to cybercriminals.<\/p>\n<p data-path-to-node=\"10\"><strong>Risks include:<\/strong><\/p>\n<ul data-path-to-node=\"11\">\n<li>\n<p data-path-to-node=\"11,0,0\"><strong>Financial Theft:<\/strong> Providing your banking information allows attackers to drain your accounts.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"11,1,0\"><strong>Identity Theft:<\/strong> Providing your name, phone number, and password can be used to hijack your university account or open fraudulent credit lines.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"11,2,0\"><strong>Credential Harvesting:<\/strong> If you use the same password for this &#8220;form&#8221; as you do for your university login, attackers can gain access to your student records and personal emails.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"13\">What Should You Do?<\/h2>\n<ol start=\"1\" data-path-to-node=\"14\">\n<li>\n<p data-path-to-node=\"14,0,0\"><strong>Do not click any links<\/strong> or provide any information.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"14,1,0\"><strong>Report the email<\/strong> via the <a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 Phish Alert Button (PAB)<\/a>.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"14,2,0\"><strong><span style=\"color: #333333\">Do<\/span><\/strong><span style=\"color: #333333\">\u00a0<strong>not <\/strong>approve any Duo MFA requests you did not initiate.<\/span><\/p>\n<\/li>\n<\/ol>\n<h2>Additional Notes<\/h2>\n<ul>\n<li><strong>Remember<\/strong><strong>:<\/strong>\u00a0Information Technology will never text you. We will also never request your password or Duo codes,\u00a0<strong>ever<\/strong>.<\/li>\n<li>Information Technology will\u00a0<strong data-start=\"1865\" data-end=\"1872\">not<\/strong>\u00a0ask you to verify accounts or submit passwords through unofficial forms or unexpected email links.<\/li>\n<li>Do you think you\u2019ve fallen for a scam? Did you share personal information? Downloaded malicious content? Please contact the IT Service Desk at\u00a0<a href=\"tel:9736557971\" class=\"\"><span class=\"a11y-phone-number initialized\" aria-label=\"9 7 3  6 5 5  79 71 \">973-655-7971<\/span><\/a>\u00a0option 1 or email\u00a0<a href=\"mailto:itservicedesk@montclair.edu\">itservicedesk@montclair.edu<\/a>.<\/li>\n<li>Use the\u00a0<a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 Phish Alert Button (PAB)<\/a>\u00a0to report malicious emails directly to the Information Security team for review. If you are not using the Gmail client please forward the email to\u00a0<a href=\"mailto:phishfiles@montclair.edu\">phishfiles@montclair.edu<\/a>.<\/li>\n<li>Always use the \u201chover over\u201d technique to check web links before clicking! For more security tips please visit our\u00a0<a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/\">Security Tips<\/a>\u00a0page.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Why This Email May Look Legitimate Use of Official Names: The email mentions BMTX (BankMobile), a service many universities actually use for disbursements. Specific Dollar Amounts: Using a precise figure like $1,367.64 creates a sense of realism and urgency. Professional Formatting: It includes standard boilerplate language about &#8220;Identity Theft&#8221; and &#8220;Customer Service&#8221; to mimic a [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":1446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=1445"}],"version-history":[{"count":2,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1445\/revisions"}],"predecessor-version":[{"id":1449,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1445\/revisions\/1449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/1446"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=1445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=1445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=1445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}