The Information Security team within Information Technology Services has detected an increase in sophisticated phishing attacks targeting the University community. These phishing emails look real and often originate from compromised accounts at other universities. Attackers exploit recipients’ trust and use convincing tactics to steal account credentials.
Here is how these attacks typically work and how you can protect yourself.
How The Attacks Work
- Spoofed Emails: Attackers send emails that seem to originate from trusted peers or partners at other universities.
- Fake Document Links: The emails contain links that you are expected to click on. Recent attacks have used a pretext of saying a document that needs to be shared is encrypted and, in order to decrypt it, you must log in to the link.
- Fraudulent Validation: If recipients email the sender for confirmation because they are suspicious, attackers respond with reassuring but fake replies.
- Credential Theft: Trusting the response, recipients enter their credentials into a counterfeit Microsoft login page at the other end of the link.
- MFA Exploitation: The attackers harvest the credentials and use them to trigger a legitimate Microsoft multi-factor authentication (MFA) request, which victims will see in the Microsoft Authenticator app. Bad actors email their victim the two-digit code to enter into the app. If the victim enters it, the bad actors gain complete access to their accounts. If the victims use SMS as their MFA method, the bad actors will send an email trying to get the victim to send them the provided code.
- Account Misuse: Attackers use compromised accounts to attempt changes to payroll direct deposit information and/or to launch further attacks from the victim’s email account.
Protect Yourself
Be Cautious of Unexpected Emails: Avoid clicking on links or providing information unless you are certain of the sender’s legitimacy.
Validate by Phone, Not Email: If you suspect a phishing attempt, verify directly by calling the sender. Never rely on email validation for suspicious requests.
Beware of Fraudulent MFA Prompts: Be cautious of unusual MFA prompts or requests. Never enter codes from unknown sources. Microsoft MFA will never send the two-digit code via email. Any email claiming to provide such a code is fraudulent. If you use SMS as an MFA method, nobody will ever ask you for the code via text or email.
Report Phishing Attempts Immediately: You can use Outlook’s “Report Message” feature to flag suspicious emails.
Stay alert and reach out to the IT Security team (infosec@syr.edu) with any questions or concerns. Your vigilance is vital to keeping our community safe.