{"id":131,"date":"2017-03-17T11:56:05","date_gmt":"2017-03-17T11:56:05","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itsecurity\/?p=131"},"modified":"2018-11-02T11:31:46","modified_gmt":"2018-11-02T11:31:46","slug":"malicious-email-from-birmingham-university-account","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/03\/17\/malicious-email-from-birmingham-university-account\/","title":{"rendered":"Malicious email from Birmingham University account"},"content":{"rendered":"<p>The following are examples of phishing email sent from a Birmingham account that had been compromised. \u00a0 If you look carefully at the content it should be clear that the messages are not genuine.\u00a0 We think that the fact that it originated from within the University led some people to believe that it was real.<\/p>\n<p>Here is a breakdown of some of the features that indicate that the email was bogus.\u00a0 The sender has been changed to a fictitious name for confidentiality.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-133 size-full\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-1.jpg\" alt=\"The image shows an example phishing or other form of malicious email and illustrates aspects of the email that make it look suspicious.\" width=\"1199\" height=\"755\" srcset=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-1.jpg 1199w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-1-300x189.jpg 300w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-1-768x484.jpg 768w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-1-1024x645.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-135 size-full\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2.jpg\" alt=\"The image shows an example phishing or other form of malicious email and illustrates aspects of the email that make it look suspicious.\" width=\"1203\" height=\"397\" srcset=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2.jpg 1203w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2-300x99.jpg 300w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2-768x253.jpg 768w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2-1024x338.jpg 1024w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/03\/outlook-education-2-1200x396.jpg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following are examples of phishing email sent from a Birmingham account that had been compromised. \u00a0 If you look carefully at the content it should be clear that the messages are not genuine.\u00a0 We think that the fact that it originated from within the University led some people to believe that it was real. &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/03\/17\/malicious-email-from-birmingham-university-account\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Malicious email from Birmingham University account&#8221;<\/span><\/a><\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,3,13],"tags":[],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-malicious-email","category-examples-of-malicious-email","category-phishing"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":3,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":138,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/131\/revisions\/138"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}