"Document shared with you" phishing emails


Phishing emails are on the rise at the University of Maryland.  Phishing emails are crafted in a way to make you believe the information and sender are real, and for you to divulge passwords, financial information, and other personal data.

A recent phishing email campaign attempted to gain access to accounts by asking for the user’s Directory ID and password. These credentials were then immediately used to log into the user’s account, thereby initiating a Duo request, which the user allows, leading to a full compromise of their account.

Below is an example of such an email. This email states that someone has shared a file with the recipient. Because the email can potentially look legitimate, many users may click on the link to the file. The email may also make reference to someone the user may know, thereby adding to the supposed legitimacy.

Email about a shared document from a user outside the university.
An email about a shared document from a user outside the university.

 

The document linked will ask you to click another link to view the file and/or verify your identity.

Clicking on these links then leads to a website that asks you to “log in” to your account.  But this is not a legitimate login page – rather, this is a form that is collecting anything you type in. Some variations of this are shown below.

Fake Staff Directory Report form asking for the user to submit their email and password.
Fake Staff Directory Report form asking for the user to submit their email and password.

Fake Work/School Account collection form with multiple typos.
Fake Work/School Account collection form with multiple typos.

 

Once credentials are entered and submitted, the attacker has captured them and will immediately use them to log into the users’ account. At this point, the user would receive a Duo authentication request.  If the user does not respond to the Duo request or denies it, the attacker will continue to try to gain access by initiating more Duo requests.  Eventually the user may become confused and approve the Duo request, thereby letting the attacker into their account.  

Once the attacker is in the account, the user most likely won’t notice anything is wrong. The attacker will set up email filters which will hide their activity from the user. Below are some filters that may have been set up in a users’ account so they do not receive certain emails in their inbox.

Filters may be set to security, alert, undeliverable, delete, link, spam or password.
Filters may be set to security, alert, undeliverable, delete, link, spam or password.

 

Attackers will then use this account to send out additional phishing emails like the one the user fell for, and may also use the account to send out job offer scams to the university community and beyond. Below are examples of such scam emails.

Fake Survey Analyst position. Fake remote administrative assistant job offer.
Fraudulent job offer emails sent from a user within the University.

 

Unfortunately, recipients of these emails believe the job offer to be real as it was sent by a UMD email account. Because the attacker is still in control of the user’s email, they can respond to anyone who tries to follow up with them – even those who are dubious about the legitimacy of the email. The purpose of this type of scam is to extort money from the would-be applicant of the job offer.

How you can prevent becoming a victim

University of Maryland's Central Authentication Service login page.
UMD's Central Authentication Service(CAS) login page.