{"id":798,"date":"2025-09-19T08:00:15","date_gmt":"2025-09-19T12:00:15","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=798"},"modified":"2025-09-15T13:02:59","modified_gmt":"2025-09-15T17:02:59","slug":"spot-fake-logins","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/09\/19\/spot-fake-logins\/","title":{"rendered":"Don\u2019t Fall for the Phish: Spotting Fake Logins Before It\u2019s Too Late"},"content":{"rendered":"
Phishing attacks are getting sneakier\u2014and more convincing. One of the most common tricks we\u2019re seeing is fake login pages designed to mimic ÌÇÐÄvlog\u2019s single sign-on (SSO)<\/strong> system. These pages often look identical to the real thing but are designed to steal your login credentials \u2014 and even your Duo codes<\/strong><\/a>.<\/p>\n Whether you’re a student, faculty member, or staff, it’s important to stay alert. Here’s how to spot a fake, what to do if something feels off, and what to do if you\u2019ve already clicked.<\/p>\n Phishing emails try to trick you into clicking a link or downloading an attachment. Look for these red flags:<\/p>\n Urgency or threats<\/strong>: \u201cYour account will be deactivated in 24 hours!\u201d<\/p>\n<\/li>\n Unusual sender address<\/strong>: The display name might look legit, but the actual email address is off.<\/p>\n<\/li>\n Generic greetings<\/strong>: \u201cDear user\u201d instead of your name.<\/p>\n<\/li>\n Strange formatting or logos<\/strong>: Low-quality images, misspelled words, weird spacing.<\/p>\n<\/li>\n Unexpected attachments or links<\/strong>: Especially if you weren\u2019t expecting anything.<\/p>\n<\/li>\n<\/ul>\n Before you click any link, hover your mouse<\/strong> over it (or long-press on mobile) to see where it actually goes.<\/p>\n Ask yourself:<\/p>\n Does the URL match the real login domain?<\/p>\n<\/li>\n Is it spelled correctly? (e.g. Does it use HTTPS<\/strong> (a padlock icon \ud83d\udd12 in the address bar)?<\/p>\n<\/li>\n<\/ul>\n Fake SSO login pages often look identical to the real thing<\/strong>, but the URL will usually give them away.<\/p>\n If something feels off, don\u2019t click! Instead:<\/p>\n Open a new browser tab<\/strong> and go directly to your usual login page \u2014 don\u2019t use the link in the email.<\/p>\n<\/li>\n Contact IT Service Desk<\/a> if you\u2019re unsure.<\/p>\n<\/li>\n Report it using the Phishing Alert Button (PAB)<\/a> or by forwarding it to phishfiles@montclair.edu<\/a>.<\/p>\n<\/li>\n<\/ul>\n If you get a Duo<\/a> request and you\u2019re not actively logging in<\/strong>, don\u2019t tap approve<\/strong> \u2014 that\u2019s a red flag that someone may have your password and is trying to access your account.<\/p>\n Some phishing scams ask you to enter or send a Duo<\/a> code. Just like your password, your Duo codes are private<\/strong> \u2014 no one, including IT, will ever ask for them.<\/p>\n MFA fatigue<\/strong> is when an attacker spams your Duo app with repeated login requests, hoping you\u2019ll approve one just to make it stop. If that happens:<\/p>\n Don\u2019t approve any requests.<\/p>\n<\/li>\n Report it<\/strong> to IT right away.<\/p>\n<\/li>\n Change your password immediately.<\/p>\n<\/li>\n<\/ul>\n MFA works only when you\u2019re in control.<\/strong> If something feels off, trust your instincts and act fast.<\/p>\n If you accidentally submitted your login credentials on a fake page:<\/p>\n Change your password(s) immediately<\/strong> \u2013 Start with your NetID password<\/a>. If you use a similar password anywhere else (including personal accounts) reset those as well!<\/p>\n<\/li>\n Notify the Phish Files<\/strong> \u2013 Use the Knowbe4 PAB<\/a> or forward the email to phishfiles@montclair.edu<\/a>.<\/p>\n<\/li>\n Stay alert for Duo requests<\/strong> \u2013 If you see any suspicious ones, don\u2019t approve them.<\/p>\n<\/li>\n Monitor your account<\/strong> \u2013 Look for unusual activity (like login attempts from unfamiliar locations).<\/p>\n<\/li>\n<\/ol>\n If you get a suspicious email:<\/p>\n Don\u2019t click anything.<\/strong><\/p>\n<\/li>\n Forward it<\/strong> to phishfiles@montclair.edu<\/a>.<\/p>\n<\/li>\n<\/ul>\n Hover over links before clicking.<\/p>\n<\/li>\n Always check the URL on login pages.<\/p>\n<\/li>\n Don\u2019t trust emails that rush you or threaten action.<\/p>\n<\/li>\n Never approve unexpected Duo requests or share MFA codes.<\/p>\n<\/li>\n Report anything suspicious.<\/p>\n<\/li>\n If you\u2019re not sure \u2014 ask IT!<\/p>\n IT Service Desk<\/a><\/p>\n<\/li>\n To avoid ever clicking a fake link, bookmark any official pages you use (like NEST<\/a>)<\/strong>\u00a0and only sign in from that link. It’s a simple habit that can save you from phishing scams.<\/p>\n “Ask me about Duran Duran.”<\/strong><\/p>\n \u2014 Emily Harris JD, CISSP, CIPP\/US FBI.gov | Spoofing and Phishing<\/a><\/p>\n
\nHow to Spot a Phishing Email<\/h2>\n
\n
\nHover Before You Click<\/h2>\n
\n
montclair.edu<\/code> vs. montclalr.edu<\/code>)<\/p>\n<\/li>\n
\nTrust Your Gut \u2014 and Double Check<\/h2>\n
\n
\nExtra Protection: MFA & Duo Security Tips<\/h2>\n
Don\u2019t Approve Unexpected Duo Pushes<\/h3>\n
Never Share Your Duo Codes<\/h3>\n
Know About MFA Fatigue<\/h3>\n
\n
\nWhat to Do If You Clicked or Entered Info<\/h2>\n
\n
\nHow to Report Phishing<\/h2>\n
\n
\nTL;DR \u2014 Quick Safety Tips<\/h2>\n
\n
\n
\nBonus Tip: Bookmark the Real Login Page<\/h2>\n
\nChief Information Security Officer<\/p><\/blockquote>\n
\nWant to Know More?<\/h2>\n