Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security IT

Notification of Server Breach Mistaken For Phishing Email 65

netbuzz writes "Educause members and 7,000 university websites are being forced to change account passwords after a security breach involving the organization's .edu domain server. However, some initially hesitated to comply because the Educause notification email bore tell-tale markings of a phishing attempt. 'Given what is known about phishing and user behavior, this was bad form,' says Gene Spafford, a Purdue University computer science professor and security expert. 'For an education-oriented organization to do this is particularly troubling.'"
This discussion has been archived. No new comments can be posted.

Notification of Server Breach Mistaken For Phishing Email

Comments Filter:
  • Email issued by a university vice-president. Not surprised he doesn't know anything about common email frauds. He probably verbally dictated it to a secretary who took notes in shorthand and later typed it into the computer. The email has no spelling errors, a dead giveaway. What's his email address? I think a prince from Nigeria may have some good news for him soon...
    • ... which probably is sufficient answer to the asinine point made in the submission:

      'For an education-oriented organization to do this is particularly troubling.'"

      It has always been my experience that universities' IT departments are almost universally clueless. In fact, their level of cluelessness rivals and outstrips that of many banks. My (maybe just slightly cynical) assumption is that these colleges only employ their own graduates...

      • by egamma ( 572162 )

        It has always been my experience that universities' IT departments are almost universally clueless. In fact, their level of cluelessness rivals and outstrips that of many banks. My (maybe just slightly cynical) assumption is that these colleges only employ their own graduates...

        Then you haven't heard of PaulDotCom [pauldotcom.com]

    • The email has no spelling errors, a dead giveaway.

      Wasn't there a story a while back that said the exact opposite of that? That scammers want their emails to look as poorly written as possible (among other things) so as to only attract the most gullible people?

      • " That scammers want their emails to look as poorly written as possible (among other things) so as to only attract the most gullible people?"

        That might be so but people who can spell have usually more money than retards who can't.
        OTOH there are far more of those... the Germans have a proverb saying: "Little beasts make manure too."

        • by sjames ( 1099 )

          That's because they don't generally give it to Nigerian Princes who contact them by email.

          The scammers aren't interested in wasting their time on people who will ask questions or think critically about the proposal.

  • Trivial (Score:2, Informative)

    by Arancaytar ( 966377 )

    Just ignore the links in the email, go to the website you know to be real, and change your password.

    • Re:Trivial (Score:5, Insightful)

      by MrMickS ( 568778 ) on Thursday February 21, 2013 @05:09AM (#42964809) Homepage Journal

      True but by including links in the email it raises suspicion on the validity of the email. This is not dissimilar to the recent email sent from Twitter regarding accounts being compromised.

      A better approach is to provide information in the email indicating that people should visit the website to change their password, but not include a link, then place confirmation of the issue on the website landing page so as to confirm that the threat is real.

      • by thue ( 121682 )

        Just right-click the link, copy, and paste into the address line. If the domain name portion of the link is to the right website, you know that the content is controlled by the owner of the domain name (with the exception of sites which permits user-generated subpages, such as google docs).

        Or if you think your software is up to date, and your plugins are click to play, just click the link and then check if the domain name is correct.

        Links are too useful to not be able to use them in emails.

        • Re:Trivial (Score:4, Insightful)

          by Anonymous Coward on Thursday February 21, 2013 @07:35AM (#42965497)

          Or if you think your software is up to date, and your plugins are click to play, just click the link and then check if the domain name is correct.

          Riiiiight. If your Java software was up-to-date then you're only looking at a dozen or so zero-day exploits that can slip right past your 'up-to-date' plugins. Or how about the Adobe Reader zero-day that Adobe recommends turning on protected mode for everything until they fix it. That software is up-to-date as well.

          If you want to copy & paste a link, do it into NotePad and not a browser. Why play chicken? If you're already suspicious then be smart instead of trying to outsmart the phishers.

          BTW, if you're counting on your up-to-date plugins to stop things, you'll be not-so-pleasantly-surprised when the zero-days are fixed and the A/V companies have something new to look for. If the plugin vendor doesn't know about the hole then it's doubtful that the A/V companies know about it either.

        • Except that in this case the domain name portion wasn't to the "right" website, at least if the article's "the embedded link went to a third-party site with 'educause' embedded in the URL along with a sequence of meaningless characters" claim is correct.

          • by sjames ( 1099 )

            The actual link you were supposed to click to change your password went to net.educause.edu. However, the other links in the email went to educause-domain.informz.net (yeah, that looks legit!).

            Given the volume of phishing mails that come in of varying quality, it's only natural for there to be suspicion.

      • The best approach is for you to check the domain on the link (usually hovering over the link works fine for this), rather than expecting no links.. if you know enough to know that you don't want to use links from phishing mails, you should also be able to know how to check that the domain is correct.

      • Re:Trivial (Score:5, Insightful)

        by wvmarle ( 1070040 ) on Thursday February 21, 2013 @07:16AM (#42965383)

        When I get such mails that I suspect of being a phishing attempt (and as almost anyone on this planet, I'm receiving at least several of those every single day), I ignore them. The mail in question I'd likely have ignored for that exact reason: suspected phishing, ignored and forgotten by the time my finger has left the button.

        Most of the phishing mails that I receive purport to be of services I've no connection with (I don't have a hotmail or yahoo mail account, for example). They're easy. Others pretend to be from sites where I do have connection with (e.g. gmail), they're harder to distinguish but it's rather safe to assume they're fake, too. Only when I read about a breach on an independent site, like /. indeed (which I trust as in not being related to phishers), then it'd be time for action. If I were to follow your advice, and go to the web site the phishing mail pretends to come from, I'd spend my whole day changing e-mail passwords.

        The only mails that I'd recognise as real, would be if they use my complete name, preferably including middle name, when addressing me. Not "dear e-mail user", not "dear wvmarle@gmail.com" or "dear wvmarle". PayPal for example is doing that very well, and that's so far the only way I would believe those mails to be real. And still I'd not use a link provided in those mails, just to be sure.

        • My WoW account has been "hacked" thousands of times at this point. Too bad whoever snagged it discovered it was a level two gnome on a free trial.
        • The only mails that I'd recognise as real, would be if they use my complete name, preferably including middle name, when addressing me.

          If your email address is: <firstname>.<lastname>@yourdomain.com (as many are), it isn't too difficult for the phisher to guess the first and lames.

    • by msauve ( 701917 )
      We've hacked into X's web server. Unfortunately, that doesn't give us access to their user/password database. We can, however, capture information posted via HTML forms. Please use X's website to change your password. You'll be expected to enter your current password as part of the process. Thank you for your cooperation.
    • "Just ignore the links in the email, go to the website you know to be real, and change your password."

      Do you also ignore the key-logger they installed they day before sending that email to make you rush to login?

  • by Anonymous Coward

    Major bank here.

    We received an email about mandatory IT risk training.
    - With those who hadn't participated yet in cc. (hundreds)
    - With a link to an outside domain. (xyzlearning.com instead of xyz.com)
    - With our password in the plain body of the email '12345678'

    It was real. I forwarded it to the 'phishing attempts'-mailbox, but never got an answer.
    Something I really don't understand is that in an organisation with so much brains, higher degrees, experience..., there is even more stupidity.
    And I have the feel

  • Or dumb user! Read the email, if it sounds like it might be legit and your unsure then call the company. However being that you probably never get this email from them you can assume it's safe.
    • Re: Bad Form? (Score:2, Offtopic)

      Your = possessive pronoun. You're = contraction of you are. Not complicated.

      • If that's what stumped you then just wow, a spelling mistake is a mistake not an email meant to steal data.
        • That's not a spelling mistake, it's a grammatical mistake.

          • It's a grammar mistake if they mean't you are and wrote your. It's a spelling mistake if they mean't you're and wrote your. In either case anyone who assumed that little issue was enough to make the email an attempt to steal data needs help.
    • You really want me to contact gmail five times a day to verify all those mails they send me? And how to contact them anyway, other than by e-mail?

  • We got one of these notices at our university. After trying to determine if the message was spam we decided it was likely real, but suspicious due to the link to a 3rd party website that redirected to educause to reset the password. I ended up going to their website and calling the number they listed there (which was different from the one given in the email) just to verify that the email was legitimate before we entered information into the webform.
  • by dkleinsc ( 563838 ) on Thursday February 21, 2013 @08:22AM (#42965793) Homepage

    I want users to be suspicious and skeptical of emails with strange links. I want them to not completely trust emails that purport to be from their system administrator.

    In other words, the portion that didn't immediately follow the email's instructions are to be praised, not harangued.

  • I work at an organization that is a member of EDUCAUSE. I received the email in question. I can honestly say that the person that came up with an idea to send out the notification from their marketing company instead of EDUCAUSE themselves should be thinking long and hard about finding a consultant for situations that involve common sense. DO NOT send out emails of the utmost importance and use the same tactics that spammers and scammers use. I would think for an institution involved in higher education
  • by swm ( 171547 ) * <swmcd@world.std.com> on Thursday February 21, 2013 @09:56AM (#42966853) Homepage

    Occasionally, one of my banks or health care orgs calls me on some (legitimate) business.
    The first thing they do is ask me for my identifying info (SSN, birthdate, etc).
    See, their security and privacy regs require them to verify my identity.
    I always refuse, and try to explain the problem to them.

    In the early days (going back maybe 5 years),
    they had no idea what I was talking about,
    and I could not get them to understand the problem.

    Eventually, some of them understood that they had a problem.
    But their understanding of the problem was that some of their customers wouldn't talk to them,
    which meant that they couldn't complete the business at hand,
    which mattered to them (or else they wouldn't have initiated the call in the first place).
    Their solution?
    Offer me a call-back number, so that I can call them instead.
    Because, see, if I initiate the call, then they must be who they say they are, right? Right?

    Just once in the last year, I had a bank that really understood the problem.
    When I balked, they allowed that I could call back in on the customer service number *on my credit card*.
    So I did.
    From the reactions of the people who answered,
    I got the impression that few of their customers do this.

    • by tlhIngan ( 30335 )

      Just once in the last year, I had a bank that really understood the problem.
      When I balked, they allowed that I could call back in on the customer service number *on my credit card*.
      So I did.
      From the reactions of the people who answered,
      I got the impression that few of their customers do this.

      I do that whenever I get a warning that my card may be compromised. I call the number on the card. If it's on security lockout the computer recognizes this and immediately routes me to the security department. (Because

  • I've received several e-mails from Paypal that were textbook phishing attempts and then all the links and the sending server are actually Paypal-owned. So they're not the only ones sending out suspicious and badly arranged e-mails.
    • Nod32 may be good antivirus software, and perhaps the best, but when you buy something directly from their web site you get an e-mail that isn't even from eset.com but from netsuite.com spoofing eset.com, saying:

      Please open the attached file to view your Cash Sale.

      To view the attachment, you first need the free Adobe Acrobat Reader. If you don't have it yet, visit Adobe's Web site http://www.adobe.com/products/acrobat/readstep.html [adobe.com] to download it.

      WTF?

      Another WTF is the summary here.
      "[...] says Gene Spafford, a Purdue University computer science professor and security expert."
      Since when did Spaf need an introduction? That's like saying "Steve Wozniak, a computer scientist and electronics engineer".

      Yes, you might need that clarification if yo

  • by phaunt ( 1079975 ) * on Thursday February 21, 2013 @10:42AM (#42967471)

    Michael Sinatra over at seclists.org [seclists.org] had the following to say:

    This should be a lesson to all of us, since EDUCAUSE is definitely not alone here: We all do regular, legitimate business in ways that is sometimes indistinguishable from phishing, at least to regular users. That needs to stop. Email marketers and analytics junkies will not like to hear this, but we need to put an end to embedded email links that are redirected through other systems. IMO, we should put an end to *all* legitimate links in emails; instead have a business portal with all of the links to surveys, training sites, etc., and have notification emails for when new things appear on the portal. In addition, we could modify our SSO sites so that they alert users when they need to take care of something that we would normally use email for which to notify the user. Once that's done, we can assure users that we will NEVER ask them to click on a link in an email, just like we currently remind them that we never ask them for passwords.

    If that is "too hard" and/or the analytics stuff is "too valuable" then we need to simply accept the risk that our users will get caught in phishing attacks. The bad guys have figured out that it is very easy to mimic our business practices, and they have gotten very good at doing it. Unless we change those practices, they will find us to be easy pickings.

    • by micheas ( 231635 )
      Or if analytics are too valuable one could always self host the analytics. Civicrm and phplist are two options for that that I can think of off the top of my head..
  • So... this story is about an e-mail which allegedly resembled a phishing attempt.

    Yet TFA doesn't include the text of the e-mail...

    BRILLIANT!

  • by neminem ( 561346 ) <(neminem) (at) (gmail.com)> on Thursday February 21, 2013 @11:15AM (#42967967) Homepage

    A couple months ago I was informed, in an email that had absolutely every telltale sign of being a phish (other than mispellings, I suppose; it was written in proper English), that someone had probably stolen my card, and I should click on this link if I agreed, or this other one if I had made the charges. The links didn't go to the bank's site. I almost threw it away.

    It was a legitimate email; my card had actually been stolen.

    I emailed their phishing department with a copy of it, and a pointed "this looks like a phish. I know it's legitimate, but here are all the ways it looks like it isn't. Perhaps you should rethink this email you're sending out?" Their response: "this is not a phish". Yes, I know that. I SAID that. Apparently nobody in that department can think, or read? (Fun fact: this is coming from one of the "big four" banks, according to wikipedia.)

  • Got the email and was confused - it was very well written, actually was overly well written. Alarm bells started ringing. Then checked the actual links on the text for 'create a new password' and they pointed to educause.[some other domain name].net All the graphics had tracking ids in the URLs which is odd for an alert email. Went to look at the educause website and no warnings of a security problem or need to reset passwords. My guess is their emailing service works great for newsletters, they need to
  • What rock did you crawl out of? "Education-oriented organizations" rank among the most incompetent with respect to anything IT, and in particular security. They're staffed not by the best and brightest in the industry but rather those that couldn't hack it in the competitive real world. They're the dross that's left over after business and the DoD have had their fill of graduates.

Some people only open up to tell you that they're closed.

Working...