  {"id":1461,"date":"2026-03-02T10:12:51","date_gmt":"2026-03-02T15:12:51","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=1461"},"modified":"2026-03-02T10:13:50","modified_gmt":"2026-03-02T15:13:50","slug":"new-week-staff-faculty-school-notice","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2026\/03\/02\/new-week-staff-faculty-school-notice\/","title":{"rendered":"\ud83d\udea8New Week Staff &amp; Faculty School Notice !!!\ud83d\udea8"},"content":{"rendered":"<h2 data-start=\"412\" data-end=\"449\">Why This Email May Look Legitimate<\/h2>\n<p data-start=\"451\" data-end=\"565\">Cybercriminals design phishing emails to appear trustworthy. This message uses several tactics to lower suspicion:<\/p>\n<ul data-start=\"567\" data-end=\"1504\">\n<li data-start=\"567\" data-end=\"725\">\n<p data-start=\"569\" data-end=\"725\"><strong data-start=\"569\" data-end=\"603\">Familiar Name in the Signature<\/strong><br data-start=\"603\" data-end=\"606\" \/>The email includes the name and title of a real member of our campus community, making it appear officially endorsed.<\/p>\n<\/li>\n<li data-start=\"727\" data-end=\"916\">\n<p data-start=\"729\" data-end=\"916\"><strong data-start=\"729\" data-end=\"765\">Professional Tone and Formatting<\/strong><br data-start=\"765\" data-end=\"768\" \/>The message is written in formal language and references \u201cfaculty and staff appreciation,\u201d which aligns with legitimate Montclair communications.<\/p>\n<\/li>\n<li data-start=\"918\" data-end=\"1408\">\n<p data-start=\"920\" data-end=\"1020\"><strong data-start=\"920\" data-end=\"955\">High-Value, Recognizable Brands<\/strong><br data-start=\"955\" data-end=\"958\" \/>The giveaway items reference well-known products, including:<\/p>\n<ul data-start=\"1023\" data-end=\"1337\">\n<li data-start=\"1023\" data-end=\"1079\">\n<p data-start=\"1025\" data-end=\"1079\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Airstream<\/span><\/span> travel trailer<\/p>\n<\/li>\n<li data-start=\"1082\" data-end=\"1107\">\n<p data-start=\"1084\" data-end=\"1107\">Stealth Bomber E-Bike<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1341\" data-end=\"1408\">Referencing recognizable brands makes the offer feel more credible.<\/p>\n<\/li>\n<li data-start=\"1410\" data-end=\"1504\">\n<p data-start=\"1412\" data-end=\"1504\"><strong data-start=\"1412\" data-end=\"1435\">Old University Logo<\/strong><br data-start=\"1435\" data-end=\"1438\" \/>The message uses an outdated Montclair logo to appear official.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1506\" data-end=\"1509\" \/>\n<h2 data-start=\"1511\" data-end=\"1542\">Signs This Email Is Phishing<\/h2>\n<p data-start=\"1544\" data-end=\"1631\">Despite its professional appearance, several red flags indicate this is not legitimate:<\/p>\n<ul data-start=\"1633\" data-end=\"2697\">\n<li data-start=\"1633\" data-end=\"1755\">\n<p data-start=\"1635\" data-end=\"1755\"><strong data-start=\"1635\" data-end=\"1662\">External Sender Address<\/strong><br data-start=\"1662\" data-end=\"1665\" \/>The email originates from an external email address, not an official Montclair account.<\/p>\n<\/li>\n<li data-start=\"1757\" data-end=\"1905\">\n<p data-start=\"1759\" data-end=\"1905\"><strong data-start=\"1759\" data-end=\"1793\">Mismatched Contact Information<\/strong><br data-start=\"1793\" data-end=\"1796\" \/>Recipients are instructed to email a different external address that is not affiliated with the university.<\/p>\n<\/li>\n<li data-start=\"1907\" data-end=\"2174\">\n<p data-start=\"1909\" data-end=\"2174\"><strong data-start=\"1909\" data-end=\"1952\">Request to Use a Personal Email Address<\/strong><br data-start=\"1952\" data-end=\"1955\" \/>The message specifically asks you to use a personal (non-university) email account to respond.<\/p>\n<ul data-start=\"1633\" data-end=\"2697\">\n<li data-start=\"1907\" data-end=\"2174\">\n<p data-start=\"1909\" data-end=\"2174\">This is a<strong> major red flag<\/strong>. Scammers attempt to move conversations off official systems to avoid security monitoring.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2176\" data-end=\"2329\">\n<p data-start=\"2178\" data-end=\"2329\"><strong data-start=\"2178\" data-end=\"2210\">Too Good to Be True Giveaway<\/strong><br data-start=\"2210\" data-end=\"2213\" \/>Extremely high-value items are being offered with no official webpage, registration form, or verification process.<\/p>\n<\/li>\n<li data-start=\"2331\" data-end=\"2431\">\n<p data-start=\"2333\" data-end=\"2431\"><strong data-start=\"2333\" data-end=\"2357\">Non-Existent Sponsor<\/strong><br data-start=\"2357\" data-end=\"2360\" \/>The email references a \u201cretired community member\u201d who does not exist.<\/p>\n<\/li>\n<li data-start=\"2433\" data-end=\"2552\">\n<p data-start=\"2435\" data-end=\"2552\"><strong data-start=\"2435\" data-end=\"2469\">Urgency &amp; Limited-Time Framing<\/strong><br data-start=\"2469\" data-end=\"2472\" \/>Phrases like \u201climited-time opportunity\u201d are designed to pressure quick action.<\/p>\n<\/li>\n<li data-start=\"2554\" data-end=\"2697\">\n<p data-start=\"2556\" data-end=\"2697\"><strong data-start=\"2556\" data-end=\"2604\">Unusual Subject Line &amp; Excessive Punctuation<\/strong><br data-start=\"2604\" data-end=\"2607\" \/>Multiple exclamation points and emoji-heavy formatting are common in phishing campaigns.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2699\" data-end=\"2702\" \/>\n<h2 data-start=\"2704\" data-end=\"2726\">What Are the Risks?<\/h2>\n<p data-start=\"2728\" data-end=\"2768\">If you respond to this email, you could:<\/p>\n<ul data-start=\"2770\" data-end=\"3013\">\n<li data-start=\"2770\" data-end=\"2824\">\n<p data-start=\"2772\" data-end=\"2824\">Expose your <strong data-start=\"2784\" data-end=\"2824\">full name and personal email address<\/strong><\/p>\n<\/li>\n<li data-start=\"2825\" data-end=\"2875\">\n<p data-start=\"2827\" data-end=\"2875\">Open the door to <strong data-start=\"2844\" data-end=\"2875\">follow-up phishing attempts<\/strong><\/p>\n<\/li>\n<li data-start=\"2876\" data-end=\"2913\">\n<p data-start=\"2878\" data-end=\"2913\">Be targeted for <strong data-start=\"2894\" data-end=\"2913\">financial scams<\/strong><\/p>\n<\/li>\n<li data-start=\"2914\" data-end=\"2953\">\n<p data-start=\"2916\" data-end=\"2953\">Become a victim of <strong data-start=\"2935\" data-end=\"2953\">identity theft<\/strong><\/p>\n<\/li>\n<li data-start=\"2954\" data-end=\"3013\">\n<p data-start=\"2956\" data-end=\"3013\">Be added to scammer distribution lists for future attacks<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3015\" data-end=\"3099\">Even a simple reply confirms your email is active, making you a higher-value target.<\/p>\n<hr data-start=\"3101\" data-end=\"3104\" \/>\n<h2 data-start=\"3106\" data-end=\"3128\">What Should You Do?<\/h2>\n<p data-start=\"3130\" data-end=\"3158\">If you receive this message:<\/p>\n<ol data-start=\"3160\" data-end=\"3405\">\n<li data-start=\"3160\" data-end=\"3180\">\n<p data-start=\"3163\" data-end=\"3180\"><strong data-start=\"3163\" data-end=\"3180\">Do not reply.<\/strong><\/p>\n<\/li>\n<li data-start=\"3181\" data-end=\"3238\">\n<p data-start=\"3184\" data-end=\"3238\"><strong data-start=\"3184\" data-end=\"3238\">Do not use your personal email address to respond.<\/strong><\/p>\n<\/li>\n<li data-start=\"3239\" data-end=\"3284\">\n<p data-start=\"3242\" data-end=\"3284\"><strong data-start=\"3242\" data-end=\"3284\">Do not share any personal information.<\/strong><\/p>\n<\/li>\n<li data-start=\"3285\" data-end=\"3359\">\n<p data-start=\"3288\" data-end=\"3359\"><strong data-start=\"3288\" data-end=\"3359\">Report the email using the <a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 Phish Alert Button (PAB)<\/a>.<\/strong><\/p>\n<\/li>\n<li data-start=\"3360\" data-end=\"3405\">\n<p data-start=\"3363\" data-end=\"3405\"><strong data-start=\"3363\" data-end=\"3405\">Delete the message after reporting it.<\/strong><\/p>\n<\/li>\n<\/ol>\n<p data-start=\"3407\" data-end=\"3484\">If you already responded, contact the <a href=\"https:\/\/www.montclair.edu\/information-technology\/it-service-desk\/\">IT Service Desk<\/a> immediately.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why This Email May Look Legitimate Cybercriminals design phishing emails to appear trustworthy. This message uses several tactics to lower suspicion: Familiar Name in the SignatureThe email includes the name and title of a real member of our campus community, making it appear officially endorsed. Professional Tone and FormattingThe message is written in formal language [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":1462,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":3,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":1465,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1461\/revisions\/1465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/1462"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}