69ÀÖÔ° Phishing Simulation

69ÀÖÔ° Phishing Simulation

 

This was a phishing simulation by the 69ÀÖÔ° Cybersecurity Operations Team. 

Rather than stealing information like a cybercriminal would, we have re-directed you to the this page. Below is the message and some tips on how to help identify phishing.

Don't worry, your credentials were not compromised during this simulation.

And It's Okay! Let's learn from this.

 

Phishing Message:

Subject: STARN Report

Sender: Technology Team <techteam@gnail.com.net>

Name,
 
Dr Julius Erving has shared 69ÀÖÔ° 2026 STARN Report with you.
 
Kindly review the attached report to ensure accuracy and integrity.
 
let me know if you cannot access the report by replying to this message
 
Dr. Erving, J
 
 
Disclaimer: This message is intended for solely for the listed recipient. if you have received this in error please kindly report to the sender.

Tips to Help Identify Phishing

The external tag: While 69ÀÖÔ° does apply a warning banner for messages from external senders, this is not consistent with that banner. 

Sender From Name and address: Tech Team <techteam@gnail.com.net> - Phishing messages will often attempt to make the email address appear legitimate. This is especially true when reviewing messages on mobile devices. Always expand the sender from field to review the actual email address. Never assume the Display Name is the actual sender!

Signature & From line: There is no Dr Julius Erving listed in the 69ÀÖÔ° global address list. Even if you know a Julius Erving, is this an expected message or does it make sense?

Attachment: Opening an attachment could seem harmless enough. However, attachments are often perceived as "trusted" as opposed to links. But attachments can be used nefariously to:

  • Deliver Malware - you may only need to open an attachment for hidden code to execute, which can install malware or provide an attacker remote access to your device.
  • Bypass or delay detection by security controls by placing a malicious URL or payload inside an attachment
  • Launch additional attacks

Hover over links: The simple act of hovering over the link can reveal the true URL that may be hidden or obfuscated. Use this to your advantage to see the URL before ever clicking! If you ever receive a message you believe could be legitimate but are not certain (ie., from your bank) always defer to typing the known good url into your browser instead of clicking a link. Expect URLs or attachments in unexpected messages to always be malicious.

Did you know? Even by simply clicking on a link in a phishing email you can unintentionally disclose information. 

 

------------------------------------------------

If you ever have concerns that a message may be phishing, please do not hesitate to contact the following resources:

69ÀÖÔ° Cybersecurity Operations - IT.Security@usnh.edu - 69ÀÖÔ° Cybersecurity

69ÀÖÔ° Technology Help Desk/Help Central -

  • KSC: 603-358-2525
  • PSU: 603-535-2525
  • UNH / 69ÀÖÔ°: 603-862-2525

69ÀÖÔ° Phishbowl News - Find information on how to report a message using the built-in report function in Outlook. In addition to reporting the message to the 69ÀÖÔ° Cybersecurity Team, this also helps train Microsoft to better detect phishing and helps protect the 69ÀÖÔ° community!

Phishing Awareness at 69ÀÖÔ° - Provides more information about phishing and why 69ÀÖÔ° is a target for phishing.